Plagiarism-Report 1
Plagiarism-Report 1
Plagiarism-Report 1
Date 2023-05-17
0%
100%
Words 708
Plagiarised Unique
Characters 4892
CHAPTER 1 INTRODUCTION
Client: Big Companies whose most of the work is relied on the data exchange between different departments. Hospitals
who share sensitive data of the patients with the research laboratories. Any organization that shares confidential data with
other of their trusted agents and if leaked can result in huge loses to the organization.
Need: Today every organization works on a lot of data which is shared between different departments of the organization
or so called the trusted agents and also some of the third-party agents. Thus, the value of an organization is measured
using the data it generates and how it uses that data to improve themselves or their services. If this confidential data is
leaked then it will result in the deprecation of the value of the organization and its integrity. Therefore, we need to ensure
the security of this data.
A number of issues can develop in a data leakage detection system that reduce its effectiveness. False positives and false
negatives—where acceptable actions are mistakenly reported as cases of data leakage or real occurrences are overlooked
—are frequent problems. Inadequate data classification can make it difficult for the system to recognize and safeguard
sensitive information. Data breaches may go undiscovered due to low visibility across several channels, such as email or
file-sharing websites. It may be difficult to distinguish between typical and suspect activity if user behavior profiling is
inaccurate. Data leakage may become more likely if privileged users who have access to sensitive information are not
sufficiently monitored.
The system's capacity to correlate events and identify potential leaks is constrained by a lack of integration with other
security technologies. Inadequate employee data security training and awareness might leave workers vulnerable to social
engineering attacks or unintended data releases. To find new or undiscovered dangers that might elude conventional
detection methods, proactive threat hunting is crucial. Data leakage issues may be handled slowly or incorrectly due to
inadequate incident response skills and a lack of well-defined response protocols. Last but not least, skipping routine
system upgrades and maintenance makes the system more susceptible to fresh attack vectors and less effective at spotting
and stopping data leaks.
Identify: The identification phase involves determining the requirements for the Data Leakage Detection System. This
includes understanding the needs of the people, the technology stack to be used, and the overall scope of the project.
Some of the tasks related to this phase are listed below:
Page 1 of 2
• Understanding the different data leakage sources and causes.
• Defining the functional and non-functional requirements for Data Leakage Detection System.
• Defining the user stories and use cases to identify the features required.
Build: The building phase involves developing the software based on the requirements identified in the previous phase.
This involves the following tasks:
• Building a watermarking system that is more efficient than the pre-existing systems and embedding codes in it which
can be later used to identify the data.
Test: The testing phase involves verifying that the software meets the requirements and functions as intended. This includes
the following tasks:
• Conducting unit testing, integration testing, and system testing to ensure that the detection system functions
correctly.
•
Conducting user acceptance testing to ensure that the software meets the needs of the people outside.
In summary, the identification phase involves determining the requirements for the people outside, the building phase
involves developing the program based on these requirements, and the testing phase involves verifying that the program
would meet the requirements and functions as intended.
1.4 Timeline
Matched Source
No plagiarism found
Page 2 of 2