Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2022, Advances in Multidisciplinary and Scientific Research Journal
…
10 pages
1 file
According to a survey, 90% of all information never leaves the digital form. The fundamental importance of data preservation is quite clear, as a small inattentive move could lead to a loss of pertinent data which could inform a major decision. The majority of information these days is being created, modified, and consumed entirely in digital form. This means most spreadsheets, digital snapshots and databases will never make it onto paper. It is common to lose data due to storage errors or low performance. If this happens, the user/owner may want to quickly recover the files if the data is really important and if it is possible to retrieve the lost data. In this article, we look at ways data can be lost through deletion, recovery procedures and mechanisms, and recommendations to secure data against such events. (3)
Although data loss has become an important problem that needs to be solved in many types of organizations, possible routes of data loss have become complicated and numerous, making countermeasures difficult to develop. Fujitsu Laboratories is developing data loss prevention technologies that integrate know-how related to mobile devices, data searching technologies, and security technologies like encryption that have been under development at Fujitsu for some time. These data loss prevention technologies are undergoing verification and testing within the company with an eye towards commercialization. This paper introduces three technologies that will enable information to be used in an expanded workplace with guaranteed safety, without placing a burden on the user. The expanded workplace will extend beyond the borders of a company to include offline work at a customer's office and at other organizations including collaborating companies. The paper begins by introducing a solution for moving data safely outside the company using a novel universal serial bus (USB) memory device. Next, it presents an E-mail filter for preventing the erroneous sending of E-mail containing sensitive information. Finally, it describes document management technology for protecting a document across its entire lifecycle including editing. It also touches upon data loss prevention technologies in the coming era of software as a service (SaaS) and Cloud computing.
In the present world computer market offers storage of huge data in the digital form and they are stored in devices such as internal and external drives, USB flash drives, memory cards of phone and cameras and CD/DVD devices in the file format and takes some storage space of drives. The stored data can be accidentally deleted or formatted, in either case the files or data is lost and there comes the need of data recovery. Data recovery is possible because the link to file is deleted from the memory but it exists in memory.
2017
The technology world has greatly evolved over the past three decades and it is at a pace where an average user’s laptop can accommodate up to a terabyte of data, where a tiny SD card can store an entire database of an organization, where file transferring has become less complex, and where users can easily connect to any wireless network (Private or Public) within the range of their wireless devices to exchange sensitive information. This evolvement has led to one of the greatest challenges organizations are faced with, which is in the area of adequately protecting their sensitive information from being lost or leaked. Data Loss Prevention (DLP) techniques was created in preventing these breaches on data loss, when these breaches occur in an organization. DLP systems has gained popularity over the last decade and is now referred as a matured technology, and with the alarming rate at which digitally stored assets is growing, the need for DLP systems has also increased. This paper dis...
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
Data loss poses a significant and increasing problem for organisations. This is shown by the regular stories of data loss reported daily in the media, such as the mailing of 2 CDs containing 25 million personal records by the Revenue and Customs in the UK. There is a need to provide systematic protection to data in all its forms and locations however it is accessed. We have developed Searchlight, a three-layer security architecture containing the physical, logical and social levels, which we use to analyse data loss holistically to prevent, detect and recover from exposure. We examine deliberate and accidental data loss by employees, but the same analysis can be straightforwardly applied to external attacks. Our practical security model appears to have widespread application to other problem domains such as critical infrastructure, the insider threat and financial systems, as it allows the analysis of systems in their entirety including human and physical factors, not just as technical systems.
2023 IEEE International Conference on Emerging Trends in Engineering, Sciences and Technology (ICES&T)
Cloud computing is the collection of excellent services (storage, databases, etc.) provided to customers and organizations over the internet to fulfill their requirements efficiently. Everything depends on the internet, and you can access your data anywhere. On the other hand, cloud service clients must ensure that the outsourced backup is secure enough to entrust with their data. This research highlighted how the cloud has benefited people by providing unlimited, secure storage without any high cost of investment in hardware. Cloud storage also aids in the security of your data backup, allowing you to access your files and documents even if your hardware is lost or damaged. It is also known as disaster recovery. Google Photos and Google Drive are examples of adequately encrypted backup storage. This paper also discusses the core functionalities of Google photos and Google drive and their advantages in a more comprehensive form. This research's main aim is to provide users with awareness regarding data loss and recovery. Furthermore, threats related to modern technology are also part of this research. In addition, the article also included some graphs and figures to explain the results and facts in detail.
International Journal of Cyber Forensics and Advanced Threat Investigations, 2021
Forensic analysis and evidence collection for web browser activity is a recurring problem in digital investigation. It is not unusual for a suspect to cover his traces. Accordingly, the recovery of previously deleted data such as web cookies and browser history are important. Fortunately, many browsers and thousands of apps used the same database system to store their data: SQLite. Reason enough to take a closer look at this product. In this article, we follow the question of how deleted content can be made visible again in an SQLite-database. For this purpose, the technical background of the problem will be examined first. Techniques are presented with which it is possible to carve and recover deleted data records from a database on a binary level. A novel software solution called FQLite is presented that implements the proposed algorithms. The search quality, as well as the performance of the program, is tested using the standard forensic corpus. The results of a performance study...
Data loss prevention systems are centralized data management systems that monitor and safeguard sensitive information, manage policies, enforce flow of data, and calculate incidents .Most current approaches to data loss prevention design are system dependent and involve specific hardware and commercial software systems. This paper represents a theoretical framework for data loss prevention in terms of a flow based conceptual model. It proposes that this system can be oriented toward the entire information lifecycle by using this framework as a foundation for specification and design of this model. also looking for a system, method, and computer program product are provided for preventing data loss associated With an image.
Lost Laptops = lost date: measuring costs, managing threats, 2008
Connecting Research in Security to Practice (CRISP) reports provide insights into how different types of security issues can be tackled effectively. Drawing on research and evidence from around the world, each report summarizes the prevailing knowledge about a specific aspect of security, and then recommends proven approaches to counter the threat. Connecting scientific research with existing security actions helps form good practices. This series invites experts in specialist aspects of security to present their views on how to understand and tackle a security problem, using the best research evidence available. Reports are written to appeal to security practitioners in different types of organizations and at different levels. Readers will inevitably adapt what is presented to meet their own requirements. They will also consider how they can integrate the recommended actions with existing or planned programs in their organizations. In this CRISP report, Glen Kitteringham, CPP, anal...
This article is the second part of on ongoing series about lost data. The first part, titled "Proposal for a Monument to Lost Data," sought to establish the growing impact of lost data and proposed the establishment of a monument as a healthy response to the problem. This article covers some of the same subjects but also considers steps to implementing the monument.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal for Research in Applied Science and Engineering Technology
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers - UbiComp '18, 2018
International journal of engineering & technology, 2018
Concepts, Methodologies, Tools, and Applications, 2015
Journal of Integrated Information Management
International Journal of Health Sciences (IJHS), 2022
International Journal of Digital Curation, 2008
BACKUPS AS A BACKUP AND RECOVERY MECHANISM OF DIGITAL INFORMATION (Atena Editora), 2024
Data Science Journal, 2005
Digital Investigation, 2019
International Robotics & Automation Journal, 2018
Proceedings of the Southwest Decision Sciences Institute, 2010
Procedia Technology, 2014
REHEMA UROKI, LL.M - ICT LAW - 2012 / 2013, PAPER PRESENTATION, 2013
Information Systems Education Journal, 2014
System Sciences, …, 2005