Data Loss Prevention
Featuring 8 Papers as of August 8, 2013
Protecting Small Business Banking
Susan Bradley - August 8, 2013
Over the last several years, the use of online banking and other financial transactions have risen dramatically.
Information Risks & Risk Management
John Wurzler - May 1, 2013
In a relatively short period of time, data in the business world has moved from paper files, carbon copies, and filing cabinets to electronic files stored on very powerful computers.
People, Process, and Technologies Impact on Information Data Loss
Paul Janes - November 9, 2012
Organizations have always had contend with issue of data loss; however, with the advent of the computer and worldwide connectivity, the problem has become magnified.
- The Risks of Client-Side Data Storage Edwin Tump - May 16, 2011
One Touch Disaster Recovery Solution for Continuity of Operations
Rajat Ravinder Varuni - May 28, 2010
In this publication I present a solution where information is available during or following a disaster.
The Business Justification for Data Security
Securosis - February 11, 2009
In the information security world we face two major types of threats: noisy threats which directly interfere with our ability to do business and quiet threats which cause real damage, but dont necessarily prevent people from doing their jobs. Noisy threats such as viruses, worms, and spam; attack both networks and systems, and clearly disrupt productivity and business operations. With highly visible (and often very annoying) attacks, its easy to justify investments to curb their impact. When the CFO see hundreds of spam messages in his inbox, hes very likely to fund an anti-spam solution.
Data Loss Prevention
Prathaben Kanagasingham - September 5, 2008
Data breach has been one of the biggest fears that organizations face today. Quite a few organizations have been in the news for information disclosure and a popular recent case is that of T.J.Maxx. While DLP is not a panacea to such attacks, it should certainly be in the arsenal of tools to defend against such risks.
The Mechanisms and Effects of the Code Red Worm
Renee Schauer - October 31, 2003
This paper addresses the vulnerability that was present in Microsoft Internet Information Services (IIS) web server software and the worm, Code Red, which exploited this vulnerability.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.