• No results found

Data Leakage Prevention (DLP) Understanding The Concept. George Ntontos Partner, In.T.Trust S.A.

N/A
N/A
Protected

Academic year: 2021

Share "Data Leakage Prevention (DLP) Understanding The Concept. George Ntontos Partner, In.T.Trust S.A."

Copied!
21
0
0

Loading.... (view fulltext now)

Full text

(1)

Data Leakage Prevention (DLP)

Understanding The Concept

George Ntontos

(2)

External Threats: •Viruses •Hackers •Blackmail •Spamming •Trojans Company Perimeter: • Corporate Network • Office Space • Mobile Computers • Removable Devices Internal Threats: •Data Leakage •Unauthorized access to  information

(3)

The most dangerous incident possible is a DATA LEAK

irreversible

pursued by regulators

damages reputation

leads to direct financial loss

70-80%

of all losses from IT-incidents comes from authorized

(4)

In 2008 the losses because of data leak contained from

$400K to $32M

Sources: Ponemon “The 2008 Annu al Study: Cost o f a Data Breach”
(5)

Biggest part of losses is

lost profit:

• Lost clients

• Lost partners

• Lost market share

• Lost confidence

(6)

How much a data leak may cost?

Customer

Incident

Possible loss, EU*

Universal bank Reliable debtor registry 30 M Retail bank A list of a 1000 persons, checked by

company security department 15 M IT-Company Malefactor communication 0.5 M Oil & gas company Purchase commission demands 0.2 M Oil & gas company Tender application 200 M

(7)

}

Companies internal employees

}

Temporary employees: translators, trainees, etc

}

Outsourced employees: data-centers, call-centers

}

Transportation companies: couriers

}

Employees of other companies that have access to information within

(8)

}

Copies on removable media

} Forwarding and sending emails

} Web access (web-mail, blogs, messengers, etc)

} Printing and carrying away the printed copy

(9)

Channels of data leakage

Channels of data leakage

(10)
(11)

} Only 20% of information is structured *

} >10% of information is changing every day **

} 10% of information is ‘zero day documents’ **

} 30% of documents are not ‘absolute confidential’ **

IT MEANS THAT IT IS IMPOSSIBLE TO PROTECT DYNAMIC INFORMATION WITH STATIC DOCUMENT-BASED METHODS ONLY

*) Autonomy 2008 **) InfoWatch 2009

(12)

Company Perimeter: • Corporate Network • Office Space • Mobile Computers • Removable Devices Removable Devices Leaks: • USB/Flash disks/cards • Printers • Bluetooth, WiFi • CD/DVD Portable  Storage: • Loss • Theft Network Leaks: • Web • Mail • Instant  Messages • Network Printing

(13)
(14)

INTERCEPTION ANALYSIS DECISION-MAKING STORING • Agents on workstations • Universal traffic interceptors • Server plug-ins • Formal attributes • Linguistics • “Fingerprints” • Tags • Allow • Block • Process further • In file system • In DB (+ full-text search)

(15)

All modern DLP-systems allow to:

}

Control network traffic

}

Control network printing

}

Control the connection of external devices to work-station

}

Integrate with encryption tools

Not all modern DLP-systems allow to:

}

Effectively protect both static and dynamic data

(16)

Technology

Features and advantages

Stop-words and

regular expressions Detection of leaks of information formed by a certain pattern, for example credit cards numbers, passports numbers, SSN, bank accounts, etc.

Linguistic and

context analysis Proactive protection (works with dynamic data, new or changed documents)of confidential data right after its creation

Digital

fingerprinting and watermarks

Protection of rarely changing data, which was preliminary found and indexed (works well to protect static data, for example,

(17)

Stop words Regular expressions Digital Water-marks Digital Finger-printing Hybrid Analysis Context Analysis Dictionaries Linguistic Analysis

Hybrid analysis is

more efficient

thanks to merging

of several

different

technologies

(18)

} Interceptors’ number and quality

ƒ Controlled channels

ƒ Ability to block suspicious objects

} Analysis methods

ƒ Analyzed formats ƒ Encryption detection

ƒ Classification method: probabilistic (linguistics and/or hash), deterministic (tags and/or attributes)

} Abi

lity to collect evidence for investigation ƒ Including full-text search
(19)

} The money is allocated from other budget item

} They are required by regulations and standards

} Every company has experienced a security incident

} Information security is overbudgeted + F.U.D.

(20)

} Many related services except installing and configuring

• Audit and change of data storage and circulation methods • Audit and change of juridical base

} High resource intensity

• Several servers + DBs + a system for archiving and storing • Related products: URL-filters, anti-spam, print-servers, etc.

} The majority of the projects are first implemented

• Nothing to compare

• The project may not be successful and this will not affect anyone

} Low-competitive market

• Several market players with different technologies

(21)

Thank you for attention!

Your questions are most welcome.

Learn more :

www.infowatch.com

References

Related documents

We contribute an integrated approach to learning proba- bilistic relational rules from probabilistic examples and back- ground knowledge. It is incorporated in the ProbFOIL + sys-

Gre za prelomno razsodbo, po kateri morajo v državah, kjer poslujejo, spoštovati pravila, ki veljajo za transportna podjetja (Košir, 2018). Ponuja se vprašanje, ali

Computed tomography revealed an ascending thrombosis of the iliac and right ovarian veins complicated by bilateral pulmonary embolism.. The patient responded well to the combination

4) Because authentic, communicative language use with an emphasis on rich input and meaningful interaction is the basis of an optimal second language learning environment

NIDIAG Kick-off Meeting – 2nd and 3rd December 2010 – Antwerpen, Belgium NIDIAG: Syndromic approach to N eglected I nfectious D iseases at Primary Care Level

Flood forecasting models used in recent studies of the Humber River basin include (i) a deterministic continuous simulation model named Streamflow Synthesis and Reservoir

In volume markets, mobile broadband now has mass-market potential, since multiple segments can afford the service. The per- formance gap between fixed and mobile broadband

This strategy should emphasize on this issue that: “How can coordination and integration be established among all the processes and activities carried out in the length of