Skip to main content

Data Leakage - Threats and Mitigation

1931 (PDF, 4.14MB)

24 Oct 2007
ByPeter Gordon
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Denial of Service Deterrence

Research Paper

Denial of Service has been a very useful practice for attackers and continues to remain prevalent...

  • 1 Apr 2015

Practical El Jefe

Research Paper

El Jefe is open source process monitoring software for Windows. With this tool, incident handlers...

  • 31 Mar 2015

Using Influence Strategies to Improve Security Awareness Programs

Research Paper

Even companies with extensive, well-funded security awareness programs fall victim to attacks...

  • 25 Oct 2013

Talking Out Both Sides of Your Mouth: Streamlining Communication via Metaphor

Research Paper

As Security is a relatively new field, we are still learning how to communicate what we know with...

  • 4 Oct 2013

Information Risks and Risk Management

Research Paper

This brief will cover the various exposures that companies now face as they increasingly rely on...

  • 1 May 2013

Surfing the Web Anonymously - The Good and Evil of the Anonymizer

Research Paper

Companies of all sizes spend large amounts of time, resources, and money to ensure that their...

  • 8 Oct 2012

Robots.txt

Research Paper

Although this GIAC gold paper is not about search engine optimization, or SEO, this paper will...

  • 31 May 2012

A Process for Continuous Improvement Using Log Analysis

Research Paper

Good security is a moving target. Walls and castles were once good defenses against attackers, but...

  • 26 Oct 2011

Measuring Psychological Variables of Control In Information Security

Research Paper

The effects of an individual's personal feelings of control over aspects of their health have been...

  • 12 Jan 2011

Which Disney(c) Princess are YOU?

Research Paper

Social engineering for identity theft has always been around. But now, with the advent of social...

  • 18 Mar 2010

Prelude as a Hybrid IDS Framework

Research Paper

Organizations both Large and Small are constantly looking to improve their posture on security....

  • 24 Mar 2009

The Importance of Security Awareness Training

Research Paper

One of the best ways to make sure company employees will not make costly errors in regard to...

  • 14 Jan 2009

Vendor-Supplied Backdoor Passwords - A Continuing Vulnerability

Research Paper

Vendor-Supplied Backdoor Passwords - A Continuing Vulnerability

  • 26 Sep 2008

Making Security Awareness Efforts Work for You

Research Paper

Making Security Awareness Efforts Work for You

  • 20 May 2008

The Controlled Event Framework for Information Asset Security

Research Paper

The Controlled Event Framework for Information Asset Security

  • 20 Feb 2008

Identity Theft

Research Paper

The act of identity theft can be performed by anyone, it could be family, friends or spouses. The...

  • 2 Jul 2007

Social Engineering Your Employees to Information Security

Research Paper

This paper will examine the role and value of Information Security Awareness efforts in the...

  • 19 Dec 2006

Building a Security Policy Framework for a Large, Multi-national Company

Research Paper

Information Security is not just technology. It is a process, a policy, and a culture. Our...

  • 5 May 2005

The Role of the Security Analyst in the Systems Development Life Cycle

Research Paper

This paper will proceed in a very logical manner to describe how a sequential development life cycle...

  • 5 May 2005

A Discussion of Spyware

Research Paper

We have secured our networks, implemented 'defense in depth' enforced strong passwords and educated...

  • 28 Jan 2005

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.