Information Leakage: Detection and Countermeasures
Phil Venables, Goldman Sachs
Scope of Illegitimate Use of Legitimate Authority in the Context of Leakage
Voice and Video Communications
Cell Phones, Cameras, Music Players, and PDAs
Indirect Inferential Disclosure
Social Networking and Contact Management Sites
Web Publishing, Blogs, and Bulletin Boards
Remote Control, Anonymizers, and Tunneled Protocols
Use of Communications Technology in Public Places
Misdirection of Communications
INTRODUCTION
Although information leakage can be the result of failings of security controls such as encryption and access control, in this context we use it specifically to mean the result of illegitimate use of legitimate authority over information, specifically, to obtain information in a legitimate way but subsequently use it in a way not intended by the granted access or organizational policies. For example, an employee leaving the company and taking his client list in electronic ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.