Posted On: Feb 22, 2018
Data leakage occurs when the data gets out the organization in an unauthorized manner. Data can be leaked in multiple ways such as emails, prints, losing laptops, the uploading of unauthorized data to different public portals, photographs, etc.
In order to detect and prevent leakage of data, various control measures can be taken. They include:
Never Miss an Articles from us.
Start by explaining vulnerability, and threat and lastly risk...
Asymmetric encryption utilizes different keys for encryption and decryption process...
Characteristics of encryption:..