The document discusses data leakage detection techniques, highlighting the critical importance of safeguarding sensitive information within organizations. It reviews various methods, including a novel sampling algorithm and sequence alignment techniques, that aim to identify unauthorized data exposure while addressing both direct and indirect losses associated with data breaches. The paper also proposes a comprehensive architecture for detecting potential data leaks based on sensitivity scoring and monitoring network access.
Related topics: