Steganography and Data Loss Prevention: An overlooked risk?

Descripción del Articulo

Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding information into picture media, to audio steganography and to the field of netw...

Descripción completa

Detalles Bibliográficos
Autor: Gutiérrez Cárdenas, Juan Manuel
Formato: artículo
Fecha de Publicación:2017
Institución:Universidad de Lima
Repositorio:ULIMA-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.ulima.edu.pe:20.500.12724/4586
Enlace del recurso:https://hdl.handle.net/20.500.12724/4586
https://dx.doi.org/10.14257/ijsia.2017.11.4.06
Nivel de acceso:acceso abierto
Materia:Data protection
Computer security
Ciencias de la computación
Protección de datos
Seguridad informática
id RULI_da4d47448ea1b56fd7cea4d750214b15
oai_identifier_str oai:repositorio.ulima.edu.pe:20.500.12724/4586
network_acronym_str RULI
network_name_str ULIMA-Institucional
repository_id_str 3883
dc.title.en_EN.fl_str_mv Steganography and Data Loss Prevention: An overlooked risk?
dc.title.alternative.es_PE.fl_str_mv Esteganografía y la prevención de la pérdida de datos: ¿Un riesgo pasado por alto?
title Steganography and Data Loss Prevention: An overlooked risk?
spellingShingle Steganography and Data Loss Prevention: An overlooked risk?
Gutiérrez Cárdenas, Juan Manuel
Data protection
Computer security
Ciencias de la computación
Protección de datos
Seguridad informática
title_short Steganography and Data Loss Prevention: An overlooked risk?
title_full Steganography and Data Loss Prevention: An overlooked risk?
title_fullStr Steganography and Data Loss Prevention: An overlooked risk?
title_full_unstemmed Steganography and Data Loss Prevention: An overlooked risk?
title_sort Steganography and Data Loss Prevention: An overlooked risk?
author Gutiérrez Cárdenas, Juan Manuel
author_facet Gutiérrez Cárdenas, Juan Manuel
author_role author
dc.contributor.other.none.fl_str_mv Gutiérrez Cárdenas, Juan Manuel
dc.contributor.author.fl_str_mv Gutiérrez Cárdenas, Juan Manuel
dc.subject.en_EN.fl_str_mv Data protection
Computer security
topic Data protection
Computer security
Ciencias de la computación
Protección de datos
Seguridad informática
dc.subject.es_PE.fl_str_mv Ciencias de la computación
Protección de datos
Seguridad informática
description Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding information into picture media, to audio steganography and to the field of network steganography. All these methods entail a potential threat to the information security policies of any business; having into the data leakage threats its likely focus. In this scenario, business corporations cannot remain blind to these types of threats and should consider adequate policies and prevention techniques to avoid these risks. We have analyzed in this article the potential dangers that an organization could face in the light of these types of steganography techniques along with a review of current commercial software vendors to analyze their offers and mishaps on Data Leakage Prevention regarding steganography risks.
publishDate 2017
dc.date.accessioned.none.fl_str_mv 2017-07-21T19:17:48Z
dc.date.available.none.fl_str_mv 2017-07-21T19:17:48Z
dc.date.issued.fl_str_mv 2017
dc.type.none.fl_str_mv info:eu-repo/semantics/article
dc.type.other.none.fl_str_mv Artículo en Web of Science (ESCI)
format article
dc.identifier.citation.es_PE.fl_str_mv Gutiérrez-Cárdenas, J. M. (2017). Steganography and Data Loss Prevention: An overlooked risk? International Journal of Security and Its Applications, (11)4, 71-84. http://dx.doi.org/10.14257/ijsia.2017.11.4.06
dc.identifier.issn.none.fl_str_mv 1738-9976
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12724/4586
dc.identifier.journal.none.fl_str_mv International Journal of Security and Its Applications
dc.identifier.isni.none.fl_str_mv 0000000121541816
dc.identifier.wosid.none.fl_str_mv WOS:000401472400006
dc.identifier.doi.none.fl_str_mv https://dx.doi.org/10.14257/ijsia.2017.11.4.06
identifier_str_mv Gutiérrez-Cárdenas, J. M. (2017). Steganography and Data Loss Prevention: An overlooked risk? International Journal of Security and Its Applications, (11)4, 71-84. http://dx.doi.org/10.14257/ijsia.2017.11.4.06
1738-9976
International Journal of Security and Its Applications
0000000121541816
WOS:000401472400006
url https://hdl.handle.net/20.500.12724/4586
https://dx.doi.org/10.14257/ijsia.2017.11.4.06
dc.language.iso.none.fl_str_mv eng
language eng
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.*.fl_str_mv https://creativecommons.org/licenses/by-nc-sa/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-sa/4.0/
dc.format.none.fl_str_mv application/html
dc.publisher.none.fl_str_mv Science and Engineering Research Support Society
dc.publisher.country.none.fl_str_mv KR
publisher.none.fl_str_mv Science and Engineering Research Support Society
dc.source.none.fl_str_mv Repositorio Institucional - Ulima
Universidad de Lima
reponame:ULIMA-Institucional
instname:Universidad de Lima
instacron:ULIMA
instname_str Universidad de Lima
instacron_str ULIMA
institution ULIMA
reponame_str ULIMA-Institucional
collection ULIMA-Institucional
bitstream.url.fl_str_mv https://repositorio.ulima.edu.pe/bitstream/20.500.12724/4586/2/license.txt
bitstream.checksum.fl_str_mv 8a4605be74aa9ea9d79846c1fba20a33
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Repositorio Universidad de Lima
repository.mail.fl_str_mv repositorio@ulima.edu.pe
_version_ 1846612167776796672
spelling Gutiérrez Cárdenas, Juan ManuelGutiérrez Cárdenas, Juan Manuel2017-07-21T19:17:48Z2017-07-21T19:17:48Z2017Gutiérrez-Cárdenas, J. M. (2017). Steganography and Data Loss Prevention: An overlooked risk? International Journal of Security and Its Applications, (11)4, 71-84. http://dx.doi.org/10.14257/ijsia.2017.11.4.061738-9976https://hdl.handle.net/20.500.12724/4586International Journal of Security and Its Applications0000000121541816WOS:000401472400006https://dx.doi.org/10.14257/ijsia.2017.11.4.06Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding information into picture media, to audio steganography and to the field of network steganography. All these methods entail a potential threat to the information security policies of any business; having into the data leakage threats its likely focus. In this scenario, business corporations cannot remain blind to these types of threats and should consider adequate policies and prevention techniques to avoid these risks. We have analyzed in this article the potential dangers that an organization could face in the light of these types of steganography techniques along with a review of current commercial software vendors to analyze their offers and mishaps on Data Leakage Prevention regarding steganography risks.application/htmlengScience and Engineering Research Support SocietyKRinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/4.0/Repositorio Institucional - UlimaUniversidad de Limareponame:ULIMA-Institucionalinstname:Universidad de Limainstacron:ULIMAData protectionComputer securityCiencias de la computaciónProtección de datosSeguridad informáticaSteganography and Data Loss Prevention: An overlooked risk?Esteganografía y la prevención de la pérdida de datos: ¿Un riesgo pasado por alto?info:eu-repo/semantics/articleArtículo en Web of Science (ESCI)OILICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.ulima.edu.pe/bitstream/20.500.12724/4586/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD5220.500.12724/4586oai:repositorio.ulima.edu.pe:20.500.12724/45862025-03-06 19:40:01.856Repositorio Universidad de Limarepositorio@ulima.edu.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
score 13.040751
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).