SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Information/Data leakage
Emil Hermansson
Definition

 Information leakage is when a system designed to be
closed for outsiders reveals information to unauthorized
parties
 It is very common that there is some amount of
information leakage, even though the leakage may be
harmless. There might be a leakage that you are
sending a message, but no information about the
message or to whom you are sending it
Special elements in this threat

 There are hackers (crackers is another name used) who
seeks and exploits weaknesses in networks
 Some information might also be leaked unintentionally
by mistake
 Information about a companys customers or their
personal information is something that might leak and
harm the company
Examples

 WikiLeaks is an example of a site that provides all sorts
of information leakage. It might not be from the social
media so much and the main source of the leakages are
whistleblowers.
 Google accidentally leaked information about their
earnings too early, costing the company USD22 Billion

 All users of social media that do not protect their privacy
sets themselves prone for identity theft
How to prevent the threats
 DLP stands for Data Loss Prevention.
 There are many companies providing softwares and
services to help companies prevent information leakage
 All major antivirus companies offer DLP services
 There are three different levels of DLP:
- Standard security measures that include firewalls and
antivirus software
- Advanced security measures that include detecting of
abnormal activities and employ machine learning
- Designated DLP solutions that include all intentional
and unintentional unauthorized sending or copying of
sensitive data
Sources

 http://www.networkworld.com/research/2008/010708data-leak-nightmares.html
 http://nakedsecurity.sophos.com/2012/10/19/data-leakgoogle-stock/
 http://en.wikipedia.org/wiki/Data_loss_prevention_softw
are
 http://wikileaks.org/About.html
 http://en.wikipedia.org/wiki/Information_leakage

Weitere ähnliche Inhalte

Was ist angesagt?

Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
Paul Melson
 

Was ist angesagt? (19)

Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Primeshare overview -_jun_2013-1
Primeshare overview -_jun_2013-1Primeshare overview -_jun_2013-1
Primeshare overview -_jun_2013-1
 
Storage Made Easy Cloud Control Gateway Overview
Storage Made Easy Cloud Control Gateway OverviewStorage Made Easy Cloud Control Gateway Overview
Storage Made Easy Cloud Control Gateway Overview
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
 
Fintech Belgium - MeeUp on The ideal RegTech partner of banks and FinTechs - ...
Fintech Belgium - MeeUp on The ideal RegTech partner of banks and FinTechs - ...Fintech Belgium - MeeUp on The ideal RegTech partner of banks and FinTechs - ...
Fintech Belgium - MeeUp on The ideal RegTech partner of banks and FinTechs - ...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's world
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
Information Security: quali aree di investimento?
Information Security: quali aree di investimento? Information Security: quali aree di investimento?
Information Security: quali aree di investimento?
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
Social media and security
Social media and securitySocial media and security
Social media and security
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
IT Security Summit 2016
IT Security Summit 2016IT Security Summit 2016
IT Security Summit 2016
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 

Andere mochten auch

Personal information
Personal informationPersonal information
Personal information
HHSome
 
06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem
andywestphal3
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
jdrinks
 
Introduction to plants
Introduction to plantsIntroduction to plants
Introduction to plants
jdrinks
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
Rosalyn Alleman
 
Social engineering
Social engineeringSocial engineering
Social engineering
HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)
Strobillus Found
 
Scientific method & variables
Scientific method & variablesScientific method & variables
Scientific method & variables
jdrinks
 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
jdrinks
 

Andere mochten auch (20)

Goals of vocabulary learning
Goals of vocabulary learning Goals of vocabulary learning
Goals of vocabulary learning
 
Malware
MalwareMalware
Malware
 
Personal information
Personal informationPersonal information
Personal information
 
Karmax itinerary(1)
Karmax itinerary(1)Karmax itinerary(1)
Karmax itinerary(1)
 
06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Introduction to plants
Introduction to plantsIntroduction to plants
Introduction to plants
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
 
Fungi
FungiFungi
Fungi
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
State of Rural Minnesota 2013-full report
State of Rural Minnesota 2013-full reportState of Rural Minnesota 2013-full report
State of Rural Minnesota 2013-full report
 
American Karma
American KarmaAmerican Karma
American Karma
 
Present perfect continuous
Present perfect continuousPresent perfect continuous
Present perfect continuous
 
12test
12test12test
12test
 
Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)Angaran rumah tangga (autosaved)
Angaran rumah tangga (autosaved)
 
Scientific method & variables
Scientific method & variablesScientific method & variables
Scientific method & variables
 
Replacement roofing
Replacement roofingReplacement roofing
Replacement roofing
 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
 
Finding the Voice of Rural Minnesota
Finding the Voice of Rural MinnesotaFinding the Voice of Rural Minnesota
Finding the Voice of Rural Minnesota
 

Ähnlich wie Assignment4

Ähnlich wie Assignment4 (20)

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf Security
 
Information security
Information securityInformation security
Information security
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Office_Cypersecurity_Basic_Training_Decmeber2022.pptx
Office_Cypersecurity_Basic_Training_Decmeber2022.pptxOffice_Cypersecurity_Basic_Training_Decmeber2022.pptx
Office_Cypersecurity_Basic_Training_Decmeber2022.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Threats
ThreatsThreats
Threats
 
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
 
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Mehr von HHSome (15)

Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Kürzlich hochgeladen

DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
ednyonat
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCRElite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing Company
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 

Assignment4

  • 2. Definition  Information leakage is when a system designed to be closed for outsiders reveals information to unauthorized parties  It is very common that there is some amount of information leakage, even though the leakage may be harmless. There might be a leakage that you are sending a message, but no information about the message or to whom you are sending it
  • 3. Special elements in this threat  There are hackers (crackers is another name used) who seeks and exploits weaknesses in networks  Some information might also be leaked unintentionally by mistake  Information about a companys customers or their personal information is something that might leak and harm the company
  • 4. Examples  WikiLeaks is an example of a site that provides all sorts of information leakage. It might not be from the social media so much and the main source of the leakages are whistleblowers.  Google accidentally leaked information about their earnings too early, costing the company USD22 Billion  All users of social media that do not protect their privacy sets themselves prone for identity theft
  • 5. How to prevent the threats  DLP stands for Data Loss Prevention.  There are many companies providing softwares and services to help companies prevent information leakage  All major antivirus companies offer DLP services  There are three different levels of DLP: - Standard security measures that include firewalls and antivirus software - Advanced security measures that include detecting of abnormal activities and employ machine learning - Designated DLP solutions that include all intentional and unintentional unauthorized sending or copying of sensitive data
  • 6. Sources  http://www.networkworld.com/research/2008/010708data-leak-nightmares.html  http://nakedsecurity.sophos.com/2012/10/19/data-leakgoogle-stock/  http://en.wikipedia.org/wiki/Data_loss_prevention_softw are  http://wikileaks.org/About.html  http://en.wikipedia.org/wiki/Information_leakage