In computer security, data leakage, also known as information leakage or leakage of sensitive or confidential data, has been occurring more and more frequently in recent years. But it was as a result of the Wikileaks leaks , starting in 2010, that they acquired media importance. We review what an information leak consists of and possible prevention measures.
A data leak or Data Leakage is the loss of confidentiality of the information of an organization, company or individual, by obtaining it or the knowledge of its content by unauthorized persons.
Unless proper controls are diligently applied, information can be expected to end up in the hands of unwanted people. Even implementing controls, the risk of an information leak does not go away.
Data leaks can be caused by internal or external causes to organizations:
They can also be deliberate or involuntary:
The most common cause of data leaks in organizations is the lack or loss of awareness and discipline in good practices and security measures for the treatment of information. Most of the time they are caused by:
Depending on the type of information that is revealed or leaked, the consequences that it produces are different. For example, the leakage of personal data can cause significant economic losses for organizations, either due to fines from regulatory agencies or the loss of the trust of their customers. If a trade secret is disclosed, it can result in the loss of a competitive advantage which in turn leads to financial damage.
In general, information leaks produce the following costs for organizations:
The main prevention measures against the leakage of confidential data are:
The leakage of data or disclosure of confidential information causes damages to organizations and individuals, including economic losses derived from sanctions, the loss of trust of their clients, the reputation of the brand, competitive advantages … You can mitigate the risk of their occurrence by implementing technical and organizational measures but, above all, by training and raising people’s awareness.
Main Difference - Summary vs Conclusion Summary and conclusion are two terms that are often…
Difference between moth and butterfly fall into two categories: anatomical and behavioral. Most moths are…
An engineer is a person whose job is to design and build engines, machines, roads,…
Internet is the term used to identify the massive interconnection of computer networks around the…
A CD-R is a type of disc that does not contain any data. It is blank…
Computing technologies are constantly evolving, and if we base our predictions on Moore's Law, they…