Skip to main content

Prevention of information loss: an overview of what can happen and some simple guidance on how to prevent it

Buy Article:

$55.00 plus tax (Refund Policy)

Abstract:

This paper shows how easily in today's information-technology society, private, personal or sensible information can be obtained, indicating the most commonly found ways in which an eavesdropping attack may take place. Exotic or very costly penetrations are beyond the present scope. Further, some simple methods are described to combat such information compromise/theft. While basic attacks can be solved with these methods, someone suspecting a serious information leak in his environment should approach a security specialist to solve this problem. The field is extremely complex and substantial knowledge is required in order to control successfully a professional eavesdropping approach.

Keywords: CRYPTOGRAPHY; DATA SECURITY; E-MAIL SECURITY; EAVESDROPPING; FAX SECURITY; ILLEGAL DATA GATHERING; INDUSTRIAL ESPIONAGE; INFORMATION; INFORMATION SECURITY; PRIVACY; SECURITY AWARENESS

Document Type: Research Article

DOI: https://doi.org/10.1080/135993799349063

Publication date: 1999-03-01

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more