Home > Research > Publications & Outputs > Detecting and Preventing Data Exfiltration

Electronic data

  • seculanc_data_exfil_report_FINAL2

    Final published version, 2.95 MB, PDF document

View graph of relations

Detecting and Preventing Data Exfiltration

Research output: Book/Report/ProceedingsOther report

Published

Standard

Detecting and Preventing Data Exfiltration. / Rashid, Awais; Ramdhany, Rajiv; Edwards, Matthew; Kibirige Mukisa, Sarah; Ali Babar, Muhammad; Hutchison, David; Chitchyan, Ruzanna.

Lancaster : Lancaster University, 2014. 40 p.

Research output: Book/Report/ProceedingsOther report

Harvard

APA

Vancouver

Author

Bibtex

@book{414059825f044a128d2f5c7c021287f9,
title = "Detecting and Preventing Data Exfiltration",
abstract = "Circa 2014. The cyber security landscape or the {\textquoteleft}ThreatScape{\textquoteright} as we call it, has changed, again. The emergence of new business models and technologies has seen a recent radical increase in vulnerabilities to which organisations are exposed. Modern organisations now operate as part of a complex, partially trusted eco- system comprising other organisations, a diverse range of third-party technologies, and end-users operating in a variety of organisational cultures. The need to meet organisational and business challenges such as increased productivity, lowered costs, and customer satisfaction has driven organisations to break the traditional {\textquoteleft}silo{\textquoteright} infrastructure model as they try to improve efficiency, engage more with customers and collaborate closely with partner organisations. Organisations have embraced cultures where employees work anytime and from anywhere.",
author = "Awais Rashid and Rajiv Ramdhany and Matthew Edwards and {Kibirige Mukisa}, Sarah and {Ali Babar}, Muhammad and David Hutchison and Ruzanna Chitchyan",
year = "2014",
month = apr,
language = "English",
publisher = "Lancaster University",

}

RIS

TY - BOOK

T1 - Detecting and Preventing Data Exfiltration

AU - Rashid, Awais

AU - Ramdhany, Rajiv

AU - Edwards, Matthew

AU - Kibirige Mukisa, Sarah

AU - Ali Babar, Muhammad

AU - Hutchison, David

AU - Chitchyan, Ruzanna

PY - 2014/4

Y1 - 2014/4

N2 - Circa 2014. The cyber security landscape or the ‘ThreatScape’ as we call it, has changed, again. The emergence of new business models and technologies has seen a recent radical increase in vulnerabilities to which organisations are exposed. Modern organisations now operate as part of a complex, partially trusted eco- system comprising other organisations, a diverse range of third-party technologies, and end-users operating in a variety of organisational cultures. The need to meet organisational and business challenges such as increased productivity, lowered costs, and customer satisfaction has driven organisations to break the traditional ‘silo’ infrastructure model as they try to improve efficiency, engage more with customers and collaborate closely with partner organisations. Organisations have embraced cultures where employees work anytime and from anywhere.

AB - Circa 2014. The cyber security landscape or the ‘ThreatScape’ as we call it, has changed, again. The emergence of new business models and technologies has seen a recent radical increase in vulnerabilities to which organisations are exposed. Modern organisations now operate as part of a complex, partially trusted eco- system comprising other organisations, a diverse range of third-party technologies, and end-users operating in a variety of organisational cultures. The need to meet organisational and business challenges such as increased productivity, lowered costs, and customer satisfaction has driven organisations to break the traditional ‘silo’ infrastructure model as they try to improve efficiency, engage more with customers and collaborate closely with partner organisations. Organisations have embraced cultures where employees work anytime and from anywhere.

M3 - Other report

BT - Detecting and Preventing Data Exfiltration

PB - Lancaster University

CY - Lancaster

ER -