SlideShare a Scribd company logo
A
SEMINAR
ON
DATA LEAKAGE
DETECTION
Sankhadip Kundu (14501212023)
Saurabh Hazra (14501212020)
Shubham Seal (14501212009)
PRESENTED BY:
INTRODUCTION
 Data leakage is defined as the accidental or unintentional distribution
of private or sensitive data to an unauthorized entity .
 Data leakage poses a serious issue for companies as the number of
incidents and the cost to those experiencing them continue to increase.
 Data leakage is enhanced by the fact that transmitted data including
emails, instant messaging, website forms, and file transfers among
others, are largely unregulated and unmonitored on their way to their
destinations.
OBJECTIVE
 A data distributor has given sensitive data to a set of
supposedly trusted agents (third parties).
 Some of the data is leaked and found in an unauthorized place
(e.g., on the web or somebody’s laptop).
 The distributor must assess the likelihood that the leaked data
came from one or more agents, as opposed to having been
independently gathered by other means.
 We propose data allocation strategies (across the agents) that
improve the probability of identifying leakages.
EXISTING SYSTEM
 Traditionally, leakage detection is handled by watermarking,
e.g., a unique code is embedded in each distributed copy.
 If that copy is later discovered in the hands of an unauthorized
party, the leaker can be identified.
Disadvantages of Existing Systems
 Watermarks can be very useful in some cases, but again, involve
some modification of the original data.
 Furthermore, watermarks can sometimes be destroyed if the data
recipient is malicious. E.g. A hospital may give patient records to
researchers who will devise new treatments.
 Similarly, a company may have partnerships with other
companies that require sharing customer data.
 Another enterprise may outsource its data processing, so data
must be given to various other companies.
 We call the owner of the data the distributor and the supposedly
trusted third parties the agents.
PROPOSED SYSTEM
 Our goal is to detect when the distributor's sensitive data has
been leaked by agents, and if possible to identify the agent that
leaked the data.
 Perturbation is a very useful technique where the data is
modified and made "less sensitive" before being handed to agents.
We develop unobtrusive techniques for detecting leakage of a set
of objects or records.
 We develop a model for assessing the "guilt" of agents.
 We also present algorithms for distributing objects to agents, in
a way that improves our chances of identifying a leaker.
Types of employees that put our company at
risk
 The security illiterate
 The unlawful residents
 The malicious/disgruntled employees
IMPACT ON ORGANIZATIONS
 Financial & reputational loss
 Small leaks accumulate to big loss
 Loss of customer & employee private information
 Loss of competitive position
 Lawsuits or regulatory consequences
MODULES
Admin Module
 Administrator has to logon to the system.
 Admin can add/view/delete/edit the user details.
User Module
 A user must login to use the services.
 A user can accept/reject data sharing requests from other users.
DATA LOSS PREVENTION
 To protect against confidential data theft and loss, a multi-layered security
foundation is needed
 Control/limit access to the data –firewalls, remote access controls, network
access controls, physical security controls
 Secure information from threats –protect perimeter and endpoints from
malware, botnets, viruses, DoS, etc. with security technology
 Control use of sensitive data once access is granted –policy-based content
inspection, acceptable use, encryption
 Cisco’s Solution for Data Loss Prevention
 Build a secure foundation with a Self-Defending Network
 Integrate DLP controls into security devices to protect data and increase
visibility.
CONCLUSION
 In the real scenario there is no need to hand over the sensitive data to
the agents who will unknowingly or maliciously leak it.
 Though the leakers are identified using the traditional technique of
watermarking, certain data cannot admit watermarks.
 In spite of these difficulties, it is possible to assess the likelihood that
an agent is responsible for a leak, based on the overlap of his data
with the leaked data
REFERENCES
 www.google.com
 www.wikipedia.com
 www.about.com
Data leakage detection

More Related Content

PDF
Data leakage detection
PPT
Data leakage detection Complete Seminar
PPTX
Data leakage detection
PPT
Data leakage detection
PPTX
Data leakage detection
PPTX
data-leakage-detection
PPTX
Data leakage detection
PPTX
Data Leakage Detection
Data leakage detection
Data leakage detection Complete Seminar
Data leakage detection
Data leakage detection
Data leakage detection
data-leakage-detection
Data leakage detection
Data Leakage Detection

What's hot (20)

DOC
Data leakage detection (synopsis)
DOC
Jpdcs1 data leakage detection
PPTX
Phishing Presentation
PDF
Information Security Lecture Notes
PPTX
PHISHING DETECTION
PDF
Database forensics
PPTX
Network security and viruses
PPTX
Types of attacks
PPTX
Email recovery
PPTX
Browser forensics
PPTX
Phishing awareness
PDF
Cyber Forensics Module 2
PPTX
Cyber Law And Ethics
PDF
Cyber Forensics Module 1
PPTX
Data protection and privacy
PDF
Mobile Security
PPTX
Social Media Forensics for Investigators
PPT
Live data collection_from_windows_system
PPTX
Digital forensics
PPTX
cyber security and forensic tools
Data leakage detection (synopsis)
Jpdcs1 data leakage detection
Phishing Presentation
Information Security Lecture Notes
PHISHING DETECTION
Database forensics
Network security and viruses
Types of attacks
Email recovery
Browser forensics
Phishing awareness
Cyber Forensics Module 2
Cyber Law And Ethics
Cyber Forensics Module 1
Data protection and privacy
Mobile Security
Social Media Forensics for Investigators
Live data collection_from_windows_system
Digital forensics
cyber security and forensic tools
Ad

Similar to Data leakage detection (20)

PDF
IRJET- Data Leakage Detection System
DOCX
DLD_SYNOPSIS
PDF
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
PDF
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
PPTX
dataleakagedetection-1811210400vgjcd01.pptx
PPT
83504808-Data-Leakage-Detection-1-Final.ppt
PDF
PDF
IRJET- A Literature Review on Deta Leakage Detection
PDF
10.1.1.436.3364.pdf
PDF
A model to find the agent who responsible for data leakage
PDF
A model to find the agent who responsible for data leakage
PDF
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
PPT
Data leakage detection
PDF
Presentation.pdf
PDF
A Survey On Data Leakage Detection
PPT
purnima.ppt
PDF
Dn31538540
PDF
Co3 rsc r5
PPTX
Deconstructing Data Breach Cost
PDF
Data Leak Protection Using Text Mining and Social Network Analysis
IRJET- Data Leakage Detection System
DLD_SYNOPSIS
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
dataleakagedetection-1811210400vgjcd01.pptx
83504808-Data-Leakage-Detection-1-Final.ppt
IRJET- A Literature Review on Deta Leakage Detection
10.1.1.436.3364.pdf
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
Data leakage detection
Presentation.pdf
A Survey On Data Leakage Detection
purnima.ppt
Dn31538540
Co3 rsc r5
Deconstructing Data Breach Cost
Data Leak Protection Using Text Mining and Social Network Analysis
Ad

Recently uploaded (20)

PPTX
1_Introduction to advance data techniques.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PDF
Launch Your Data Science Career in Kochi – 2025
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PDF
Foundation of Data Science unit number two notes
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPT
Quality review (1)_presentation of this 21
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
1_Introduction to advance data techniques.pptx
Supervised vs unsupervised machine learning algorithms
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Launch Your Data Science Career in Kochi – 2025
Introduction to Knowledge Engineering Part 1
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Foundation of Data Science unit number two notes
Clinical guidelines as a resource for EBP(1).pdf
Quality review (1)_presentation of this 21
Business Ppt On Nestle.pptx huunnnhhgfvu
Data_Analytics_and_PowerBI_Presentation.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
STUDY DESIGN details- Lt Col Maksud (21).pptx
climate analysis of Dhaka ,Banglades.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Introduction-to-Cloud-ComputingFinal.pptx

Data leakage detection

  • 2. Sankhadip Kundu (14501212023) Saurabh Hazra (14501212020) Shubham Seal (14501212009) PRESENTED BY:
  • 3. INTRODUCTION  Data leakage is defined as the accidental or unintentional distribution of private or sensitive data to an unauthorized entity .  Data leakage poses a serious issue for companies as the number of incidents and the cost to those experiencing them continue to increase.  Data leakage is enhanced by the fact that transmitted data including emails, instant messaging, website forms, and file transfers among others, are largely unregulated and unmonitored on their way to their destinations.
  • 4. OBJECTIVE  A data distributor has given sensitive data to a set of supposedly trusted agents (third parties).  Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop).  The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.  We propose data allocation strategies (across the agents) that improve the probability of identifying leakages.
  • 5. EXISTING SYSTEM  Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy.  If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified.
  • 6. Disadvantages of Existing Systems  Watermarks can be very useful in some cases, but again, involve some modification of the original data.  Furthermore, watermarks can sometimes be destroyed if the data recipient is malicious. E.g. A hospital may give patient records to researchers who will devise new treatments.  Similarly, a company may have partnerships with other companies that require sharing customer data.  Another enterprise may outsource its data processing, so data must be given to various other companies.  We call the owner of the data the distributor and the supposedly trusted third parties the agents.
  • 7. PROPOSED SYSTEM  Our goal is to detect when the distributor's sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.  Perturbation is a very useful technique where the data is modified and made "less sensitive" before being handed to agents. We develop unobtrusive techniques for detecting leakage of a set of objects or records.  We develop a model for assessing the "guilt" of agents.  We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker.
  • 8. Types of employees that put our company at risk  The security illiterate  The unlawful residents  The malicious/disgruntled employees
  • 9. IMPACT ON ORGANIZATIONS  Financial & reputational loss  Small leaks accumulate to big loss  Loss of customer & employee private information  Loss of competitive position  Lawsuits or regulatory consequences
  • 10. MODULES Admin Module  Administrator has to logon to the system.  Admin can add/view/delete/edit the user details. User Module  A user must login to use the services.  A user can accept/reject data sharing requests from other users.
  • 11. DATA LOSS PREVENTION  To protect against confidential data theft and loss, a multi-layered security foundation is needed  Control/limit access to the data –firewalls, remote access controls, network access controls, physical security controls  Secure information from threats –protect perimeter and endpoints from malware, botnets, viruses, DoS, etc. with security technology  Control use of sensitive data once access is granted –policy-based content inspection, acceptable use, encryption  Cisco’s Solution for Data Loss Prevention  Build a secure foundation with a Self-Defending Network  Integrate DLP controls into security devices to protect data and increase visibility.
  • 12. CONCLUSION  In the real scenario there is no need to hand over the sensitive data to the agents who will unknowingly or maliciously leak it.  Though the leakers are identified using the traditional technique of watermarking, certain data cannot admit watermarks.  In spite of these difficulties, it is possible to assess the likelihood that an agent is responsible for a leak, based on the overlap of his data with the leaked data