Reading Room

Data Loss Prevention

Featuring 8 Papers as of August 8, 2013

  • Protecting Small Business Banking Susan Bradley - August 8, 2013

    Over the last several years, the use of online banking and other financial transactions have risen dramatically.

  • Information Risks & Risk Management John Wurzler - May 1, 2013

    In a relatively short period of time, data in the business world has moved from paper files, carbon copies, and filing cabinets to electronic files stored on very powerful computers.

  • People, Process, and Technologies Impact on Information Data Loss Paul Janes - November 9, 2012

    Organizations have always had contend with issue of data loss; however, with the advent of the computer and worldwide connectivity, the problem has become magnified.

  • The Risks of Client-Side Data Storage Edwin Tump - May 16, 2011
  • One Touch Disaster Recovery Solution for Continuity of Operations Rajat Ravinder Varuni - May 28, 2010

    In this publication I present a solution where information is available during or following a disaster.

  • The Business Justification for Data Security Securosis - February 11, 2009

    In the information security world we face two major types of threats: noisy threats which directly interfere with our ability to do business and quiet threats which cause real damage, but dont necessarily prevent people from doing their jobs. Noisy threats such as viruses, worms, and spam; attack both networks and systems, and clearly disrupt productivity and business operations. With highly visible (and often very annoying) attacks, its easy to justify investments to curb their impact. When the CFO see hundreds of spam messages in his inbox, hes very likely to fund an anti-spam solution.

  • Data Loss Prevention Prathaben Kanagasingham - September 5, 2008

    Data breach has been one of the biggest fears that organizations face today. Quite a few organizations have been in the news for information disclosure and a popular recent case is that of T.J.Maxx. While DLP is not a panacea to such attacks, it should certainly be in the arsenal of tools to defend against such risks.

  • The Mechanisms and Effects of the Code Red Worm Renee Schauer - October 31, 2003

    This paper addresses the vulnerability that was present in Microsoft Internet Information Services (IIS) web server software and the worm, Code Red, which exploited this vulnerability.

Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact

All papers are copyrighted. No re-posting or distribution of papers is permitted.

Masters This paper was created by a SANS Technology Institute student as part of their Master's curriculum.