
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,428 |
Article View | 9,192,017 |
PDF Download | 5,622,634 |
Examining the Methods of Information Compromise and its Countermeasures Techniques | ||
پدافند غیرعامل | ||
Volume 4, Issue 4 - Serial Number 16, February 2014, Pages 1-12 PDF (420.05 K) | ||
Document Type: Original Article | ||
Authors | ||
M. H. Hasannia* ; M. Dehghani | ||
ihu | ||
Receive Date: 06 October 2013, Revise Date: 06 November 2021, Accept Date: 06 January 2014 | ||
Abstract | ||
Nowadays, the assets of an organization are assessed not only through physical possessions but also by the information they have. Information is prone to threat as are the other assets of every organization. These threats include attack from outsiders or insiders who may intend to affect the passive defense (security, safety and survivability) of the information assets an organization possesses. One of the threats to which information assets are exposed to is information compromise, the threat that causes unauthorized disclosure of confidential information. There are various ways for information compromise, therefore; it is necessary to identify and properly organize sensitive information in order to reduce the threats made by the information compromise events. The sensitive information should be protected using security tools known as DLP methods that are developed by security providers. | ||
Keywords | ||
Threat; Passive Defense; Security; Information Compromise | ||
References | ||
| ||
Statistics Article View: 3,183 PDF Download: 1,629 |