{"title":"利用大数据预防数据泄漏","authors":"Ivan Gaidarski, P. Kutinchev","doi":"10.1109/BdKCSE48644.2019.9010596","DOIUrl":null,"url":null,"abstract":"The paper present our approach for protecting sensitive data, using the methods of Big Data. To effectively protect the valuable information within the organization, the following steps are needed: Employing a holistic approach for data classification, identifying sensitive data of the organization, Identifying critical exit points - communication channels, applications and connected devices and protecting the sensitive data by controlling the critical exit points. Our approach is based on creating of component-based architecture framework for ISS, conceptual models for data protection and implementation with COTS IT security products as Data Leak Prevention (DLP) solutions. Our approach is data centric, which is holistic by its nature to protect the meaningful data of the organization.","PeriodicalId":206080,"journal":{"name":"2019 Big Data, Knowledge and Control Systems Engineering (BdKCSE)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Using Big Data for Data Leak Prevention\",\"authors\":\"Ivan Gaidarski, P. Kutinchev\",\"doi\":\"10.1109/BdKCSE48644.2019.9010596\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper present our approach for protecting sensitive data, using the methods of Big Data. To effectively protect the valuable information within the organization, the following steps are needed: Employing a holistic approach for data classification, identifying sensitive data of the organization, Identifying critical exit points - communication channels, applications and connected devices and protecting the sensitive data by controlling the critical exit points. Our approach is based on creating of component-based architecture framework for ISS, conceptual models for data protection and implementation with COTS IT security products as Data Leak Prevention (DLP) solutions. Our approach is data centric, which is holistic by its nature to protect the meaningful data of the organization.\",\"PeriodicalId\":206080,\"journal\":{\"name\":\"2019 Big Data, Knowledge and Control Systems Engineering (BdKCSE)\",\"volume\":\"254 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Big Data, Knowledge and Control Systems Engineering (BdKCSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BdKCSE48644.2019.9010596\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Big Data, Knowledge and Control Systems Engineering (BdKCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BdKCSE48644.2019.9010596","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The paper present our approach for protecting sensitive data, using the methods of Big Data. To effectively protect the valuable information within the organization, the following steps are needed: Employing a holistic approach for data classification, identifying sensitive data of the organization, Identifying critical exit points - communication channels, applications and connected devices and protecting the sensitive data by controlling the critical exit points. Our approach is based on creating of component-based architecture framework for ISS, conceptual models for data protection and implementation with COTS IT security products as Data Leak Prevention (DLP) solutions. Our approach is data centric, which is holistic by its nature to protect the meaningful data of the organization.