Eliciting Requirements for a Companywide Data Leakage Prevention System
نویسندگان
چکیده
Sensitive information assets are critical to business as their leakage can harm a company’s competitiveness and reputation [1]. To prevent information disclosure, companies increasingly make use of Data Leakage Prevention (DLP) systems [6]. As company-wide DLP systems have to operate in highly dynamic and heterogeneous working environments, the challenge is to identify requirements for configuring these systems properly. To approach this challenge, we investigate the DLP system in test at Continental Tires. As a result, we propose an approach to support elicitation of desired requirements for DLP systems and discuss preliminary results.
منابع مشابه
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment
The authors cannot comprehensively determine all of the vulnerabilities to an attack only from requirements descriptions. To resolve the problem, the authors propose a method for eliciting security requirements using the information about system architecture. The authors convert a use-case description into a variation of a data flow diagram called an asset-flow diagram (AFD). The authors then r...
متن کاملIdentifying Requirements of a Self-care System on Smartphones for Preventing Coronavirus Disease 2019 (COVID-19)
Background: Smartphone applications play a pivotal role in management, providing care and preventing infectious diseases. It also has the potential impact on supportive and self-care. This study aimed to identify the requirements for a smartphones self-care system to prevent corona-virus (COVID-19). Materials & Methods: This was a descriptive study performed in two main stages in 2020. At the ...
متن کاملA practical framework for eliciting and modeling system dependability requirements: Experience from the NASA high dependability computing project
The dependability of a system is contextually subjective and reflects the particular stakeholder s needs. In different circumstances, the focus will be on different system properties, e.g., availability, real-time response, ability to avoid catastrophic failures, and prevention of deliberate intrusions, as well as different levels of adherence to such properties. Close involvement from stakehol...
متن کاملA Review on Data Leakage Detection
This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...
متن کاملData Leakage Detection: A Survey
This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Softwaretechnik-Trends
دوره 35 شماره
صفحات -
تاریخ انتشار 2015