Data Leakage/Misuse Scenarios

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.

Cite

CITATION STYLE

APA

Shabtai, A., Elovici, Y., & Rokach, L. (2012). Data Leakage/Misuse Scenarios. In SpringerBriefs in Computer Science (Vol. 0, pp. 39–46). Springer. https://doi.org/10.1007/978-1-4614-2053-8_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free