Professional Documents
Culture Documents
Date 2023-05-17
4%
96%
Words 708
Plagiarised Unique
Characters 5122
CHAPTER 1
INTRODUCTION
Client: Big Companies whose most of the work is relied on the data exchange between different
departments. Hospitals who share sensitive data of the patients with the research laboratories. Any
organization that shares confidential data with other of their trusted agents and if leaked can result
in huge loses to the organization.
Need: Today every organization works on a lot of data which is shared between different
departments of the organization or so called the trusted agents and also some of the third-party
agents. Thus, the value of an organization is measured using the data it generates and how it uses
that data to improve themselves or their services. If this confidential data is leaked then it will
result in the deprecation of the value of the organization and its integrity. Therefore, we need
to
A number of issues can develop in a data leakage detection system that reduce its effectiveness.
False positives and false negatives—where acceptable actions are mistakenly reported as cases of
data leakage or real occurrences are overlooked—are frequent problems. Inadequate data
classification can make it difficult for the system to recognize and safeguard sensitive information.
Data breaches may go undiscovered due to low visibility across several channels, such as email
or file-sharing websites. It may be difficult to distinguish between typical and suspect activity if
user behavior profiling is inaccurate. Data leakage may become more likely if privileged users
who have access to sensitive information are not sufficiently monitored.
The system's capacity to correlate events and identify potential leaks is constrained by a lack of
integration with other security technologies. Inadequate employee data security training and
awareness might leave workers vulnerable to social engineering attacks or unintended data
releases. To find new or undiscovered dangers that might elude conventional detection methods,
proactive threat hunting is crucial. Data leakage issues may be handled slowly or incorrectly due
to inadequate incident response skills and a lack of well-defined response protocols. Last but not
least, skipping routine system upgrades and maintenance makes the system more susceptible to
fresh attack vectors and less effective at spotting and stopping data leaks.
Identify: The identification phase involves determining the requirements for the Data Leakage
Detection System. This includes understanding the needs of the people, the technology stack to
be used, and the overall scope of the project. The following tasks are involved in this phase:
• Defining the functional and non-functional requirements for Data Leakage Detection
System.
the user stories and use cases to identify the features required.
• Defining
Build: The building phase involves developing the software based on the requirements identified
in the previous phase. This involves the following tasks:
• Building a watermarking system that is more efficient than the pre-existing systems and
embedding codes in it which can be later used to identify the data.
Page 1 of 2
• Conducting and evaluating the software for a given use case.
Test: The testing phase involves verifying that the software meets the requirements and functions
as intended. This includes the following tasks:
• Conducting unit testing, integration testing, and system testing to ensure that the detection
system functions correctly.
• Conducting user acceptance testing to ensure that the software meets the needs of the people
outside.
• Conducting performance testing to ensure that the software can handle different use cases.
Fixing any bugs and issues identified during testing.
In summary, the identification phase involves determining the requirements for the people outside,
the building phase involves developing the program based on these requirements, and the testing
phase involves verifying that the program would meet the requirements and functions as intended.
1.4 Timeline
Leakage Detection System Calendar
Review of Data
Phase 1- Project Scope, Planning and Task definition [Feb 8 – March 14]
Matched Source
Similarity 34%
Title:www.coursehero.com › file › 202897796ALCOHOL AND SCHOOL SUCCESS PROJECT REPORT 2.pdf - ALCOHOL...
Identification of Client /Need / Relevant Contemporary issue Identification of Client: The client in this scenario would be
individuals or groups involved in education, such as teachers, parents, school administrators, and students.
https://www.coursehero.com/file/202897796/ALCOHOL-AND-SCHOOL-SUCCESS-PROJECT-REPORT-2pdf/
Similarity 6%
Title:Ethnic Militancy in Nigeria: A Comparative Re-appraisal of ...
The following tasks are involved in this phase: (a) revise the lesson after post-lesson conference; (b) identify needed changes to the lesson p
https://www.academia.edu/32376267/Ethnic_Militancy_in_Nigeria_A_Comparative_Re_appraisal_of_three_Major_Ethnic_Militias_in_Southern_
Page 2 of 2