Critical data leak analysis in educational environment
The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/52132/3/52132.pdf http://irep.iium.edu.my/52132/9/52132_Critical%20data%20leak_SCOPUS.pdf http://irep.iium.edu.my/52132/ http://ieeexplore.ieee.org/document/7577523/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English |
Summary: | The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally. There is a large set of software available which can be used to prevent data leak, however they fail to cover all the channels of leakage involved. Many institutions specifically educational institutions are in possession of large amounts of personal data. Due to the sheer size of these institutions, securing each and every system is overlooked. Educational institutions need to implement higher levels of security practices in their systems to stop any attempts of users trying to access critical data intentionally. If adequate measures are not taken, records belonging to the staff as well as students can be manipulated and used. We conduct a case study, and show the potential weaknesses and vulnerabilities that can exist in an educational environment which can be a path for data leak. The results have important implications on preventive measures that can be used by such institutions to avert data leak. |
---|