SlideShare a Scribd company logo
1 of 29
Data Leakage Detection
Submitted by:
Name: GauravKumar
Sic:15cs0967
Branch: CSE
Mob.No 9572343425
Contents…..
 Introduction
 How data leakage takes place
 Biggest data breaches of the 21st century
 Existing data leakage detection techniques
 Disadvantages of existing techniques
 Future scope
 Applications
 Conclusion
Introduction…..
DATA LEAKAGE is the unauthorized transmission of sensitive data or
information from within an organization to an external destination or
recipient.
SENSITIVE DATA of companies and organization includes
 intellectual property,
 Financial information,
 Patient information,
 Personal credit card data,
and other information depending upon the business and the industry
How data leakage takes place..??
 In the course of doing business, sometimes data must be handed
over to the trusted third parties for some enhancement or
operations.
 Sometimes these trusted third parties may act as points of data
leakage.
 Examples:
A. A hospital may give patient records to researcher who will devise
new treatments.
B. A company may have partnership with other companies that
require sharing of customer data.
C. An enterprise may outsource its data processing, so data must be
given to various other companies.
 Owner of data is termed as the distributor and the third
parties are called as the agents.
 In case of data leakage, the distributor must access the
likelihood that the leaked data come from one or more agents,
as opposed to having been independently gathered by other
means.
Biggest data breaches of the 21st century
1. Yahoo
Date: September 2016
Impact: 3 billion user accounts
Details: In September 2016, the once dominant Internet
giant, while in negotiations to sell itself to Verizon,
announced it had been the victim of the biggest data breach
in history, likely by “a state-sponsored actor,” in 2014. The
attack compromised the real names, email addresses, dates
of birth and telephone numbers of 500 million users. The
company said the "vast majority" of the passwords involved
had been hashed using the robust bcrypt algorithm.
2. eBay
Date: May 2014
Impact: 145 million users compromised
Details: The online auction giant reported a cyberattack in
May 2014 that it said exposed names, addresses, dates of
birth and encrypted passwords of all of its 145 million users.
The company said hackers got into the company network
using the credentials of three corporate employees, and had
complete inside access for 229 days, during which time they
were able to make their way to the user database.
3. Uber
Date: Late 2016
Impact: Personal information of 57 million Uber users and 600,000
drivers exposed.
4. Election Systems & Software – 1.8 million accounts
In August, IT security experts discovered an open Amazon Web
Services (AWS) cloud container. It contained a backup copy of data
from Election Systems & Software (ES&S), a company that
manufactures voting machines and elections management
systems. The data contained a total of almost 2 million accounts
with names, addresses, dates of birth, and party affiliations of
Illinois residents. By default, access to AWS bins is possible only
after authentication; however, for some unknown reason, the
settings on this device were misconfigured, and that made the
container accessible to the public.
 "We have a responsibility to protect your data, and if
we can't then we don't deserve to serve you,"
Zuckerberg said in a statement on his Facebook page.
Over 50 million Facebook profiles were harvested by an
app for data, which was then passed the information on
to Cambridge Analytica.
DATA LEAKAGE DETECTION
 To detect whether data been leaked by agents.
 To prevent data leakage.
Existing data leakage detection techniques
1. Watermarking
2. Steganography
1.Watermarking:
A unique code is embedded in each distributed copy. If
that copy is later discovered in the hands of an
unauthorized party, the leaker can be identified. The
watermark is difficult for an attacker to remove, even
when several individuals conspire together with
independently watermarked copies of the data.
HISTORY:
The term “water-marking” was coined by Andrew Tirkel and Charles Osborne
in December 1992. And the first successful embedding and extraction of it
was demonstrated in 1993 by Andrew Tirkel, Charles Osborne and Gerard
Rankin.
General water-marking procedure
Water-marking program
% Water Marking
clear all; close all
x=double(imread('greens.jpg'));
figure; imshow(x/255);
y=x
a=zeros(300,500);
a(100:250,100:350)=1
figure; imshow(a);
save m.dat a -ascii
x1=x(:,:,1);
x2=x(:,:,2);
x3=x(:,:,3);
dx1=dct2(x1); dx11=dx1; //discrete cosine transform
dx2=dct2(x2); dx22=dx2;
dx3=dct2(x3); dx33=dx3;
load m.dat
g=10; // to decide water-marking limit
[rm,cm]=size(m);
dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m;
dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m;
dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m;
figure,imshow(dx1);
figure,imshow(dx2);
figure,imshow(dx3);
y1=idct2(dx1);
y2=idct2(dx2);
y2=idct2(dx3);
y(:,:,1)=y1;
y(:,:,2)=y2;
y(:,:,3)=y3;
figure,imshow(y1);
figure,imshow(y2);
figure,imshow(y3);
figure;imshow(y/255);
Image before & after water-marking
DRAWBACKS OF WATERMARKING
 It involves some modification of data that is making the
data less sensitive by altering attributes of the data.
 The second problem is that these watermarks can be
sometimes destroyed, if the recipient is malicious.
2.Steganography:
Steganography is a technique for hiding a secret message
within a larger one in such a way that others can’t discern
the presence or contents of the hidden message.
Future scope
 Future work includes the investigation of agent guilt
models that capture the leakage scenarios that are not
yet considered.
 The extension of data allocation strategies so that they
can handle agent requests in an online fashion.
APPLICATIONS OF DATA LEAKAGEDETECTION
 It helps in detecting whether the distributor’s sensitive
data has been leaked by the trustworthy or authorized
agents.
 It helps to identify the agents who leaked the data.
 Reduce cybercrime.
 Copy prevention & control.
 Source tracking.
Conclusion
 In the real scenario there is no need to hand over the
sensitive data to the agents who will unknowingly or
maliciously leak it.
 However, in many cases, we must indeed work with
agents that may not be 100 percent trusted, and we
may not be certain if a leaked object came from an
agent or from some other source.
 We can provide security to our data during its
distribution or transmission and even we can detect if
that gets leaked by using data leakage detection
techniques.
Submitted by:
Name: GAURAV KUMAR
Branch: CSE
Email-id:-
Gaurav.kumar8462@gmail.com

More Related Content

What's hot

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
PacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingPacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingAPNIC
 
3.abstract (computer forensic)
3.abstract (computer forensic)3.abstract (computer forensic)
3.abstract (computer forensic)JIEMS Akkalkuwa
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxNShravani1
 
Daknet ppt ( prepared by me for seminar in my college )
Daknet ppt ( prepared by me for seminar in my college )Daknet ppt ( prepared by me for seminar in my college )
Daknet ppt ( prepared by me for seminar in my college )Nikhil Jain
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection projectHarshdaGhai
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Location-based Services - Introduction
Location-based Services - IntroductionLocation-based Services - Introduction
Location-based Services - Introductionaxelkuepper
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingMohammed Sajjad Ali
 

What's hot (20)

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
PacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingPacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto Jacking
 
3.abstract (computer forensic)
3.abstract (computer forensic)3.abstract (computer forensic)
3.abstract (computer forensic)
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptx
 
Daknet ppt ( prepared by me for seminar in my college )
Daknet ppt ( prepared by me for seminar in my college )Daknet ppt ( prepared by me for seminar in my college )
Daknet ppt ( prepared by me for seminar in my college )
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection project
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Location-based Services - Introduction
Location-based Services - IntroductionLocation-based Services - Introduction
Location-based Services - Introduction
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud Computing
 
Hacking
HackingHacking
Hacking
 

Similar to Data leakage detection

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Modeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage FraudModeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage FraudIOSR Journals
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection Suveeksha
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdfDrog3
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionIOSR Journals
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingIRJET Journal
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedStuart Clarke
 
Source Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperSource Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperDigital Shadows
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1Sohail Gohir
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityShakas Technologies
 

Similar to Data leakage detection (20)

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Modeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage FraudModeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage Fraud
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
 
Source Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperSource Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by Developer
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
AIDA ICITET
AIDA ICITETAIDA ICITET
AIDA ICITET
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 

Recently uploaded

Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 

Recently uploaded (20)

Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 

Data leakage detection

  • 1. Data Leakage Detection Submitted by: Name: GauravKumar Sic:15cs0967 Branch: CSE Mob.No 9572343425
  • 2. Contents…..  Introduction  How data leakage takes place  Biggest data breaches of the 21st century  Existing data leakage detection techniques  Disadvantages of existing techniques  Future scope  Applications  Conclusion
  • 3. Introduction….. DATA LEAKAGE is the unauthorized transmission of sensitive data or information from within an organization to an external destination or recipient. SENSITIVE DATA of companies and organization includes  intellectual property,  Financial information,  Patient information,  Personal credit card data, and other information depending upon the business and the industry
  • 4. How data leakage takes place..??  In the course of doing business, sometimes data must be handed over to the trusted third parties for some enhancement or operations.  Sometimes these trusted third parties may act as points of data leakage.  Examples: A. A hospital may give patient records to researcher who will devise new treatments. B. A company may have partnership with other companies that require sharing of customer data. C. An enterprise may outsource its data processing, so data must be given to various other companies.
  • 5.  Owner of data is termed as the distributor and the third parties are called as the agents.  In case of data leakage, the distributor must access the likelihood that the leaked data come from one or more agents, as opposed to having been independently gathered by other means.
  • 6. Biggest data breaches of the 21st century
  • 7. 1. Yahoo Date: September 2016 Impact: 3 billion user accounts Details: In September 2016, the once dominant Internet giant, while in negotiations to sell itself to Verizon, announced it had been the victim of the biggest data breach in history, likely by “a state-sponsored actor,” in 2014. The attack compromised the real names, email addresses, dates of birth and telephone numbers of 500 million users. The company said the "vast majority" of the passwords involved had been hashed using the robust bcrypt algorithm.
  • 8. 2. eBay Date: May 2014 Impact: 145 million users compromised Details: The online auction giant reported a cyberattack in May 2014 that it said exposed names, addresses, dates of birth and encrypted passwords of all of its 145 million users. The company said hackers got into the company network using the credentials of three corporate employees, and had complete inside access for 229 days, during which time they were able to make their way to the user database.
  • 9. 3. Uber Date: Late 2016 Impact: Personal information of 57 million Uber users and 600,000 drivers exposed. 4. Election Systems & Software – 1.8 million accounts In August, IT security experts discovered an open Amazon Web Services (AWS) cloud container. It contained a backup copy of data from Election Systems & Software (ES&S), a company that manufactures voting machines and elections management systems. The data contained a total of almost 2 million accounts with names, addresses, dates of birth, and party affiliations of Illinois residents. By default, access to AWS bins is possible only after authentication; however, for some unknown reason, the settings on this device were misconfigured, and that made the container accessible to the public.
  • 10.  "We have a responsibility to protect your data, and if we can't then we don't deserve to serve you," Zuckerberg said in a statement on his Facebook page. Over 50 million Facebook profiles were harvested by an app for data, which was then passed the information on to Cambridge Analytica.
  • 11.
  • 12.
  • 13.
  • 14. DATA LEAKAGE DETECTION  To detect whether data been leaked by agents.  To prevent data leakage.
  • 15. Existing data leakage detection techniques 1. Watermarking 2. Steganography
  • 16. 1.Watermarking: A unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified. The watermark is difficult for an attacker to remove, even when several individuals conspire together with independently watermarked copies of the data. HISTORY: The term “water-marking” was coined by Andrew Tirkel and Charles Osborne in December 1992. And the first successful embedding and extraction of it was demonstrated in 1993 by Andrew Tirkel, Charles Osborne and Gerard Rankin.
  • 18.
  • 19. Water-marking program % Water Marking clear all; close all x=double(imread('greens.jpg')); figure; imshow(x/255); y=x a=zeros(300,500); a(100:250,100:350)=1 figure; imshow(a); save m.dat a -ascii x1=x(:,:,1); x2=x(:,:,2); x3=x(:,:,3);
  • 20. dx1=dct2(x1); dx11=dx1; //discrete cosine transform dx2=dct2(x2); dx22=dx2; dx3=dct2(x3); dx33=dx3; load m.dat g=10; // to decide water-marking limit [rm,cm]=size(m); dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m; dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m; dx1(1:rm,1:cm)=dx1(1:rm,1:cm)g*m; figure,imshow(dx1); figure,imshow(dx2); figure,imshow(dx3);
  • 22. Image before & after water-marking
  • 23. DRAWBACKS OF WATERMARKING  It involves some modification of data that is making the data less sensitive by altering attributes of the data.  The second problem is that these watermarks can be sometimes destroyed, if the recipient is malicious.
  • 24. 2.Steganography: Steganography is a technique for hiding a secret message within a larger one in such a way that others can’t discern the presence or contents of the hidden message.
  • 25. Future scope  Future work includes the investigation of agent guilt models that capture the leakage scenarios that are not yet considered.  The extension of data allocation strategies so that they can handle agent requests in an online fashion.
  • 26.
  • 27. APPLICATIONS OF DATA LEAKAGEDETECTION  It helps in detecting whether the distributor’s sensitive data has been leaked by the trustworthy or authorized agents.  It helps to identify the agents who leaked the data.  Reduce cybercrime.  Copy prevention & control.  Source tracking.
  • 28. Conclusion  In the real scenario there is no need to hand over the sensitive data to the agents who will unknowingly or maliciously leak it.  However, in many cases, we must indeed work with agents that may not be 100 percent trusted, and we may not be certain if a leaked object came from an agent or from some other source.  We can provide security to our data during its distribution or transmission and even we can detect if that gets leaked by using data leakage detection techniques.
  • 29. Submitted by: Name: GAURAV KUMAR Branch: CSE Email-id:- Gaurav.kumar8462@gmail.com