Skip to Content
Data Leaks For Dummies®
book

Data Leaks For Dummies®

by Guy Bunker, Gareth Fraser-King
February 2009
Beginner
427 pages
9h 47m
English
For Dummies
Content preview from Data Leaks For Dummies®

Chapter 25. Preparing for the Future

In This Chapter

  • Re-examining implicit trust of employees

  • Spotting suspicious behavior in applications and users

  • Controlling data access by hiding what you don't want seen

  • Protecting against possible data loss through social networking

  • Preventing data loss in cyberspace

The trouble with data loss is that while the subject is as old as the hills, the consequences are only just being realized. It used not to be a crime to lose your laptop or to send an e-mail to the wrong person — but now it can put you on the front page of major newspapers around the globe — and not in a good way.

In the olden days of the Dark Ages — around 2006 — employees were trustworthy and honest (most of them); they had access to sensitive information and they were trusted to do the right thing with it. After all, what did they think they would do with it? Sell it? Ha!

Times, they are a-changin' — and now all information is valuable to someone. Corporate data, whether customer lists or company secrets, now commands a price on the black market if you know where to look. Malicious insiders are starting to make a name for themselves as threats. It's time to look at some of the futuristic technology — already here today — that can help combat the malicious insider. Here's why...

The Decline of Implicit Trust

One of the basic security strategies is authorization and authentication. Employees are granted access rights to applications and to data depending on their jobs or roles. Security ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

The Three Traps That Stymie Reinvention

The Three Traps That Stymie Reinvention

Ryan Raffaelli
Coaching for High Performance

Coaching for High Performance

MIT Sloan Management Review
What Successful Project Managers Do

What Successful Project Managers Do

W. Scott Cameron, Jeffrey S. Russell, Edward J. Hoffman, Alexander Laufer

Publisher Resources

ISBN: 9780470388433Purchase book