|
|
|
|
|
|
|
|
|
Data loss prevention (dlp)
Глоссарий терминов по социальной инженерии и информационной безопасности |
This aims to prevent the unauthorised loss or exfiltration of data. dlp solutions typically monitor data traffic that leaves a network for document tags, watermarks and “dlp fingerprints”. dlp functionality often comes bundled with many utm firewalls. while dlp solutions as touted by dlp vendors might be marketed as watertight, a lot of these “solutions” can be circumvented by it-savvy insiders.
|
|
Unauthorised, английский
Not given approval, or exceeding the limit of authority. see authorise
Exfiltration, английский
Эксфильтрация air ~ эксфильтрация воздуха
Watermarks, английский
Besides a pale imprint embedded in a paper document, watermarks are also algorithms embedded inside a file which can be read by special readers, they are particularly relevant to image files.
Functionality, английский
The features, operations, functions, or capability supported by a program or program component.
Watertight, английский
- Водонепроницаемый
- Fitted, sealed, or constructed so as to be impervious to penetration by water.
- A borehole in which the conditions are such that no loss of the circulated drill fluid occurs.
- A connection, container, or rock strata so tight as to be impermeable to water. 536427 o—60——7
Fingerprint, английский
- The distinctive pattern of lines on human fingertips that are used as a method of identification in criminal cases
- A mark left by a finger when something is touched. genetic
- Отпечаток; след; идентификационная метка; отличительная метка
- Any unique identifying characteristic on a diamond
|
Data minimisation, английский
Collecting the minimum amount of data needed to fulfil a purpose. data minimisation also refers to the practice of carrying the bare minimum of data on portable computing devices and storage media in order to minimise one’s exposure in the event of a data breach.
Data leak, английский
An unintentional release of confidential information to an untrusted environment. an increasingly large number of data leaks can now be attributed to social engineering attacks or plain human error.
|
|
|
|
|
|
|