半什么半什么的成语| 喝红茶有什么好处| 什么的老虎| 铅中毒是什么引起的| 大盘是什么意思| 猫吐了吃什么药| 什么水什么什么| 中年人吃什么钙片补钙效果好| 普通健康证都检查什么| 西红柿什么时候吃最好| 谪仙是什么意思| 完美落幕是什么意思| 臭氧是什么东西| 悲催是什么意思| 小棉袄是什么意思| 最近天气为什么这么热| 脾不好吃什么药最见效| 兰花用什么肥料最好| 肌酐激酶高是什么原因| 叶公好什么| 孙悟空被压在什么山下| 赛脸是什么意思| cc是什么意思啊| 颈椎不舒服挂什么科| 顺时针是什么方向| 黑脸代表什么| 什么自行车最贵| 孤独症有什么表现| vertu手机为什么那么贵| 3a是什么意思| 算筹指的是什么| 南瓜皮可以吃吗有什么作用| 外婆的妈妈叫什么| 为什么会骨盆前倾| 鲐背之年是什么意思| 戒指中指代表什么意思| 腹泻用什么药| 王晶老婆叫什么名字| 缺乏维生素b12的症状是什么| 果脯是什么东西| 小孩喜欢吃什么菜| 12月13日是什么日子| 子宫切除后对身体有什么影响| 过敏性鼻炎吃什么水果好| 酸梅汤不能和什么一起吃| 肛周湿疹用什么药膏效果好| 四月十一日是什么星座| 会车是什么| 血脂高有什么症状| 精液什么颜色| 双克是什么药| 山竹什么人不能吃| 舅舅的儿子叫什么| 梦到女儿死了是什么意思| 难免流产什么意思| 缺铁吃什么好| 尿淀粉酶高是什么原因| 湿疹用什么药效果好| 四联单是什么| 脑瘤有什么症状| 胸腔里面像岔气了的疼是什么原因| 神的国和神的义指的是什么| 怀孕后的分泌物是什么样的| 冠状沟是什么位置| 血压低吃什么补血| 什么情况会导致月经推迟不来| 莲子心泡水喝有什么功效和作用| 家里出现蜈蚣是什么预兆| 肿脚是什么原因引起的| 蛋白质阴性是什么意思| 枸杞泡水喝有什么功效| 一条什么| 五十年是什么婚| 北北是什么意思| 胶质瘤是什么病| y什么意思| 蛏子是什么| 对乙酰氨基酚片是什么药| josiny是什么牌子| 小便尿色黄是什么问题| 翠色什么流| 710是什么意思| 防蓝光是什么意思| 肾在五行中属什么| 皇帝的新装是什么意思| sjb是什么意思| 尿发绿是什么原因| 女性盆腔炎吃什么药| 白细胞高说明什么问题| 颈椎病最怕干什么活| 黄金变黑是什么原因| 结扎对男的有什么影响| 芒果不能跟什么一起吃| 社保指的是什么| 脑血管堵塞吃什么药好| 什么是川崎病| 阴超是什么| 本来无一物何处惹尘埃什么意思| 性侵是什么意思| 御姐范是什么意思| 肚脐周围疼痛是什么原因| 引以为傲是什么意思| 蛞蝓是什么意思| 后厨打荷是干什么的| 叉烧是什么| 实则是什么意思| 绝交是什么意思| 三十而立四十不惑什么意思| 得艾滋病的前兆是什么| 什么是处男| 双的反义词是什么| 冠状动脉ct检查什么| 蚯蚓吃什么食物| 为什么不建议吃茵栀黄| 入职offer是什么意思| 流年是什么| 宣字五行属什么| 脾阳虚吃什么药| 吃什么保养子宫和卵巢| 相思什么意思| 刘五行属性是什么| 梦到自己老公出轨是什么意思| 阳痿早泄吃什么药最好| 木糖醇是什么糖| zara属于什么档次| 什么时候喝咖啡最好| 什么情况下需要做心脏支架| 多酚是什么| 情志病是什么意思| 葡萄和什么不能一起吃| 胸膈痞闷是什么症状| 小产什么意思| 艾灸是什么| 肿瘤标志物是什么| 张起灵和吴邪什么关系| 头发秃一块是什么原因| 一什么荷叶| 喉咙痛吃什么药好得最快| 什么人不适合吃海参| 乌龟和鳖有什么区别| 过肺是什么意思| 化疗和放疗什么区别| 引体向上有什么好处| 心电图是什么科室| 微针有什么功效| 书的五行属性是什么| 含五行属什么| 龙眼树上的臭虫叫什么| 五十知天命什么意思| 面部痉挛吃什么药| 12月22日什么星座| 清华大学书记什么级别| 早孕有什么反应| 为什么会高血压| 送巧克力代表什么意思| 1986年虎是什么命| 什么是乙肝病毒携带者| 施华蔻属于什么档次| 书生是什么意思| 鳄鱼的天敌是什么| 莘莘学子什么意思| 白细胞计数偏低是什么意思| 灰面是什么面粉| 什么是湿气重| iwc手表是什么牌子| wdf是什么意思| 苹果不能和什么一起吃| 12月31号什么星座| 肚脐中间疼是什么原因| 五粮液是什么香型的酒| 偏激是什么意思| 巡演是什么意思| 血糖偏高能吃什么水果| 粘纤是什么材质| 属猪的守护神是什么菩萨| 密度增高影是什么意思| 阴道撕裂用什么药| 降压药什么时候吃| 膝超伸是什么| 夏至有什么习俗| 为什么牙疼| 圆脸适合什么眼镜| 地黄泡水喝有什么好处| 4月15日是什么星座| 宝妈男是什么意思| 土的行业有什么工作| 糖类抗原125偏高是什么意思| 逃出生天什么意思| 插入阴道什么感觉| 梦见黄狗是什么意思| whatsapp是什么| kpl是什么意思| 什么白| 梦见手机坏了是什么意思| 梦见弟媳妇是什么预兆| 侏儒症是什么原因引起的| 鱼油吃多了有什么副作用| 桔梗是什么| 今日是什么生肖日| 白喉是什么病| 政客是什么意思| 恒源祥属于什么档次| 为什么长湿疹| eos是什么| 高山仰止是什么意思| 子宫肌瘤是什么病严重吗| 水球是什么| 胸围98是什么罩杯| 农历七月十五是什么节| 呵呵代表什么意思| 点状钙化灶是什么意思| 一什么知什么| 艺考音乐考什么| 病危通知书意味着什么| 抽血抽不出来是什么原因| 7月30号什么星座| 喜上眉梢是什么意思| 尿不干净有余尿是什么原因| 剑桥英语和新概念英语有什么区别| 蛋白烫发是什么意思| 菊花有什么功效| 鱼什么而什么| 探望是什么意思| 花开富贵是什么生肖| 红色的月亮是什么征兆| 农历六月是什么生肖| 艾叶泡脚有什么好处| 坤造是什么意思| 皮肤敏感是什么意思| 1007是什么星座| 农历11月25日是什么星座| 鹿晗什么星座| 夫复何求是什么意思| 单核细胞高是什么意思| 獠牙是什么意思| 皮肤白斑是什么原因| 什么是微商| 头响脑鸣是什么原因引起的| 室间隔缺损是什么意思| 轻度抑郁有什么症状| 63年属什么生肖| 什么叫做t| 夺嫡是什么意思| 黄色裤子搭配什么颜色上衣| 烤瓷牙和全瓷牙有什么区别| 细菌感染吃什么消炎药| 陶渊明字什么| 八月一号什么星座| 菠菜什么季节吃| 老鼠长什么样子图片| 右肺中叶纤维灶是什么意思| 黑洞里面有什么| 什么是沉香| 颈椎病用什么药| 为什么感冒会咳嗽| 什么是靶向治疗| 一月28号是什么星座| 艾滋病是什么引起的| 什么叫血氧| 蝙蝠飞到家里是什么预兆| 肿瘤标志物是什么意思| 宁字属于五行属什么| 吃什么水果对肾有好处| 血止不住是什么原因| 百度Jump to content

屯昌120名孤寡老人、贫困户和环卫工等共享爱心...

From Wikipedia, the free encyclopedia
百度 通过警企交往、共建联建,谋求同步发展,友好进步。

Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring,[1] detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage).[2]

The terms "data loss" and "data leak" are related and are often used interchangeably.[3] Data loss incidents turn into data leak incidents in cases where media containing sensitive information are lost and subsequently acquired by an unauthorized party. However, a data leak is possible without losing the data on the originating side. Other terms associated with data leakage prevention are information leak detection and prevention (ILDP), information leak prevention (ILP), content monitoring and filtering (CMF), information protection and control (IPC) and extrusion prevention system (EPS), as opposed to intrusion prevention system.

Categories

[edit]

The technological means employed for dealing with data leakage incidents can be divided into categories: standard security measures, advanced/intelligent security measures, access control and encryption and designated DLP systems, although only the latter category are currently thought of as DLP today.[4] Common DLP methods for spotting malicious or otherwise unwanted activity and responding to it mechanically are automatic detection and response. Most DLP systems rely on predefined rules to identify and categorize sensitive information, which in turn helps system administrators zero in on vulnerable spots. After that, some areas could have extra safeguards installed.

Standard measures

[edit]

Standard security measures, such as firewalls, intrusion detection systems (IDSs) and antivirus software, are commonly available products that guard computers against outsider and insider attacks. [5] The use of a firewall, for example, prevents the access of outsiders to the internal network and an intrusion detection system detects intrusion attempts by outsiders. Inside attacks can be averted through antivirus scans that detect Trojan horses that send confidential information, and by the use of thin clients that operate in a client-server architecture with no personal or sensitive data stored on a client device.

Advanced measures

[edit]

Advanced security measures employ machine learning and temporal reasoning algorithms to detect abnormal access to data (e.g., databases or information retrieval systems) or abnormal email exchange, honeypots for detecting authorized personnel with malicious intentions and activity-based verification (e.g., recognition of keystroke dynamics) and user activity monitoring for detecting abnormal data access.

Designated DLP systems

[edit]

Designated systems detect and prevent unauthorized attempts to copy or send sensitive data, intentionally or unintentionally, mainly by personnel who are authorized to access the sensitive information. In order to classify certain information as sensitive, these use mechanisms, such as exact data matching, structured data fingerprinting, statistical methods, rule and regular expression matching, published lexicons, conceptual definitions, keywords and contextual information such as the source of the data.[6]

Types

[edit]

Network

[edit]

Network (data in motion) technology is typically installed at network egress points near the perimeter. It analyzes network traffic to detect sensitive data that is being sent in violation of information security policies. Multiple security control points may report activity to be analyzed by a central management server.[3] A next-generation firewall (NGFW) or intrusion detection system (IDS) are common examples of technology that can be leveraged to perform DLP capabilities on the network.[7][8] Network DLP capabilities can usually be undermined by a sophisticated threat actor through the use of data masking techniques such as encryption or compression.[9]

Endpoint

[edit]

Endpoint (data in use) systems run on internal end-user workstations or servers. Like network-based systems, endpoint-based technology can address internal as well as external communications. It can therefore be used to control information flow between groups or types of users (e.g. 'Chinese walls'). They can also control email and Instant Messaging communications before they reach the corporate archive, such that a blocked communication (i.e., one that was never sent, and therefore not subject to retention rules) will not be identified in a subsequent legal discovery situation. Endpoint systems have the advantage that they can monitor and control access to physical devices (such as mobile devices with data storage capabilities) and in some cases can access information before it is encrypted. Endpoint systems also have access to the information needed to provide contextual classification; for example the source or author generating content. Some endpoint-based systems provide application controls to block attempted transmissions of confidential information and provide immediate user feedback. They must be installed on every workstation in the network (typically via a DLP Agent), cannot be used on mobile devices (e.g., cell phones and PDAs) or where they cannot be practically installed (for example on a workstation in an Internet café).[10]

Cloud

[edit]

The cloud now contains a lot of critical data as organizations transform to cloud-native technologies to accelerate virtual team collaboration. The data floating in the cloud needs to be protected as well since they are susceptible to cyberattacks, accidental leakage and insider threats. Cloud DLP monitors and audits the data, while providing access and usage control of data using policies. It establishes greater end-to-end visibility for all the data stored in the cloud.[11]

Data identification

[edit]

DLP includes techniques for identifying confidential or sensitive information. Sometimes confused with discovery, data identification is a process by which organizations use a DLP technology to determine what to look for.

Data is classified as either structured or unstructured. Structured data resides in fixed fields within a file such as a spreadsheet, while unstructured data refers to free-form text or media in text documents, PDF files and video.[12] An estimated 80% of all data is unstructured and 20% structured.[13]

Data loss protection (DLP)

[edit]

Sometimes a data distributor inadvertently or advertently gives sensitive data to one or more third parties, or uses it themselves in an authorized fashion. Sometime later, some of the data is found in an unauthorized place (e.g., on the web or on a user's laptop). The distributor must then investigate the source of the loss.

Data at rest

[edit]

"Data at rest" specifically refers to information that is not moving, i.e. that exists in a database or a file share. This information is of great concern to businesses and government institutions simply because the longer data is left unused in storage, the more likely it might be retrieved by unauthorized individuals. Protecting such data involves methods such as access control, data encryption and data retention policies.[3]

Data in use

[edit]

"Data in use" refers to data that the user is currently interacting with. DLP systems that protect data in-use may monitor and flag unauthorized activities.[3] These activities include screen-capture, copy/paste, print and fax operations involving sensitive data. It can be intentional or unintentional attempts to transmit sensitive data over communication channels.

Data in motion

[edit]

"Data in motion" is data that is traversing through a network to an endpoint. Networks can be internal or external. DLP systems that protect data in-motion monitor sensitive data traveling across a network through various communication channels.[3]

See also

[edit]

References

[edit]
  1. ^ Hayes, Read (2007), "Data Analysis", Retail Security and Loss Prevention, Palgrave Macmillan UK, pp. 137–143, doi:10.1057/9780230598546_9, ISBN 978-1-349-28260-9
  2. ^ "What is Data Loss Prevention (DLP)? A Definition of Data Loss Prevention". Digital Guardian. 2025-08-14. Retrieved 2025-08-14.
  3. ^ a b c d e Asaf Shabtai, Yuval Elovici, Lior Rokach, A Survey of Data Leakage Detection and Prevention Solutions, Springer-Verlag New York Incorporated, 2012
  4. ^ Phua, C., Protecting organisations from personal data breaches, Computer Fraud and Security, 1:13-18, 2009
  5. ^ BlogPoster (2025-08-14). "Standard vs Advanced Data Loss Prevention (DLP) Measures: What's the Difference". Logix Consulting Managed IT Support Services Seattle. Retrieved 2025-08-14.
  6. ^ Ouellet, E., Magic Quadrant for Content-Aware Data Loss Prevention, Technical Report, RA4 06242010, Gartner RAS Core Research, 2012
  7. ^ "What Is a Next-Generation Firewall (NGFW)?". Cisco. 2025-08-14. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  8. ^ "What is Data Loss Prevention (DLP)? [Beginners Guide] | CrowdStrike". CrowdStrike. 2025-08-14. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  9. ^ Seltzer, Larry (2025-08-14). "3 ways to monitor encrypted network traffic for malicious activity". CSO Online. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  10. ^ "Group Test: DLP" (PDF). SC Magazine. March 2020. Archived from the original (PDF) on 2025-08-14. Retrieved September 7, 2021.
  11. ^ Pasquier, Thomas; Bacon, Jean; Singh, Jatinder; Eyers, David (2025-08-14). "Data-Centric Access Control for Cloud Computing". Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies. SACMAT '16. New York, NY, USA: Association for Computing Machinery. pp. 81–88. doi:10.1145/2914642.2914662. ISBN 978-1-4503-3802-8. S2CID 316676.
  12. ^ "PC Mag - Unstructured Data". Computer Language Co. 2024. Retrieved 14 January 2024.
  13. ^ Brian E. Burke, “Information Protection and Control survey: Data Loss Prevention and Encryption trends,” IDC, May 2008
aug什么意思 身份证借给别人有什么危害性 美国人喜欢什么颜色 1955属什么生肖 甲功异常有什么症状
心脏早搏是什么原因造成的 鼻子上长红疙瘩是什么原因 六神无主是什么意思 什么叫总胆固醇 秦昊的父母是干什么的
戒指上的s925是什么意思 torch是什么意思 气管炎用什么药 蛇用什么呼吸 同归于尽是什么意思
比利时说什么语言 芃字五行属什么 许愿是什么意思 减肥什么方法最快最有效 四面受敌是什么动物
梦到自己流鼻血是什么预兆hcv9jop5ns4r.cn 什么叫阴虚什么叫阳虚hcv7jop5ns3r.cn 猫的祖先是什么动物hcv7jop9ns9r.cn 相公是什么意思hcv8jop2ns0r.cn 俊字五行属什么hcv8jop8ns1r.cn
中耳炎吃什么药好hcv8jop5ns3r.cn 什么什么入胜hcv8jop1ns4r.cn 掉头发是什么原因男性hcv8jop1ns6r.cn 人中长痘痘是什么原因hcv8jop9ns0r.cn 30如狼40如虎是什么意思zhongyiyatai.com
小孩缺锌吃什么补的快inbungee.com 妊娠纹是什么hcv7jop4ns5r.cn helen是什么意思creativexi.com 黄体酮有什么作用与功效hcv9jop6ns9r.cn 眼镜是什么时候发明的youbangsi.com
合成立方氧化锆是什么hcv8jop1ns6r.cn 金银花为什么叫忍冬helloaicloud.com 碉堡是什么意思啊hcv9jop1ns9r.cn xyz是什么意思hcv8jop6ns9r.cn 编外人员是什么意思hcv9jop4ns8r.cn
百度