Data loss prevention (DLP) encompasses a broad range of technologies that addres
ID: 3711488 • Letter: D
Question
Data loss prevention (DLP) encompasses a broad range of technologies that address data loss by theft, misuse, or accidental disclosure. In this activity, you will consider the use of DLP technology to defend against attacks on mobile data. Data loss prevention (DLP) is a key concern associated with the use of mobile devices. Use the textbook, Mobile Device Security, and at least three external resources to learn about DLP. Use proper citations for any sources used. Write a case analysis including responses to the following: Describe DLP from a mobile device perspective. Identify and explain data loss risks. Provide recommended countermeasures to mitigate or prevent the loss of data through mobile devices. Consider vendor solutions and a defense-in-depth strategy.
Explanation / Answer
//(it prevents sharing of sensitive information etire it may be accidentally or intentionally ex sharing credit card details )
Introduction:
Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.
DLP software products use business rules to classify and protect confidential and critical information so that unauthorized end users cannot accidentally or maliciously share data whose disclosure could put the organization at risk. For example, if an employee tried to forward a business email outside the corporate domain or upload a corporate file to a consumer cloud storage service like Dropbox, the employee would be denied permission
DLP products may also be referred to as data leak prevention, information loss prevention or extrusion prevention products.
Types of DLP : there are 2 types
1)Endpoint DLP
2)network-based DLP
1)Endpoint DLP :Agent continuously monitors your data and identifies any confidential data sharing .if confidential data is shared to unauthorised user it is restricted
Can provide 24 hours maintenance in any network environment ethire public network or private network
2)network based DLP: only provides security on particular network
unprotected over other network
DLP for mobiles: Protecting the data on mobile devices is the first step to security in a consumerized enterprise environment. But even with the proper encryption and password protection in place, IT needs to face the fact that sometimes devices get lost or employees unknowingly download something malicious, personal data sharing etc
for mobiles DLP Solutions are provided by mobile device management
Mobile device management :Mobile device management (MDM) is a type of security software used by an IT department to monitor,manage and secure employees' mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.
no of mobile management suites are present in market to protect data core functanility of this
• Device enrollment;
• Profile provisioning;
• Profile management;
• Multi-profiles per device;
• Feature management;
• Multi-OS support;
• Device remote control- on/off , track/control camera/microphone/
Wi-Fi, Bluetooth, GPS, roaming, geofencing;
• Data collection;
• Secure data, files, applications;
• Multi-email support;
• Personal information management (PIM) support;
• Automated security checks;
• Provision, control, track devices;
• Device reporting;
• VOIP, video, real-time chat support;
• Coop and disaster recovery;
• Wipe data/apps, and
• Classified data, PIV, Biometric, Network monitoring
MDM includes futures for protecting application data(app related) (MAM)
fetures of MAM
• Controlled application deployment;
• Enable/disable commercial app stores;
• Installed application reporting;
• Blocking application purchases;
• Application whitelisting /blacklisting;
• Enterprise mobile app store (MAS);
• Application security;
• Mutual authentication;
• Detect/enforce device environment conditions;
• Require app digital signatures;
• Third-party app mutual authentication, and
• Software integration services
books for lerning DLP:
1)Data Loss Prevention (DLP): High-impact Strategies
2)
Author
Patricia Ray
4)
Author : Kevin RoebuckRelated Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.