Steganography and Data Loss Prevention: An overlooked risk?
Descripción del Articulo
Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding information into picture media, to audio steganography and to the field of netw...
Autor: | |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2017 |
Institución: | Universidad de Lima |
Repositorio: | ULIMA-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorio.ulima.edu.pe:20.500.12724/4586 |
Enlace del recurso: | https://hdl.handle.net/20.500.12724/4586 https://dx.doi.org/10.14257/ijsia.2017.11.4.06 |
Nivel de acceso: | acceso abierto |
Materia: | Data protection Computer security Ciencias de la computación Protección de datos Seguridad informática |
id |
RULI_da4d47448ea1b56fd7cea4d750214b15 |
---|---|
oai_identifier_str |
oai:repositorio.ulima.edu.pe:20.500.12724/4586 |
network_acronym_str |
RULI |
network_name_str |
ULIMA-Institucional |
repository_id_str |
3883 |
dc.title.en_EN.fl_str_mv |
Steganography and Data Loss Prevention: An overlooked risk? |
dc.title.alternative.es_PE.fl_str_mv |
Esteganografía y la prevención de la pérdida de datos: ¿Un riesgo pasado por alto? |
title |
Steganography and Data Loss Prevention: An overlooked risk? |
spellingShingle |
Steganography and Data Loss Prevention: An overlooked risk? Gutiérrez Cárdenas, Juan Manuel Data protection Computer security Ciencias de la computación Protección de datos Seguridad informática |
title_short |
Steganography and Data Loss Prevention: An overlooked risk? |
title_full |
Steganography and Data Loss Prevention: An overlooked risk? |
title_fullStr |
Steganography and Data Loss Prevention: An overlooked risk? |
title_full_unstemmed |
Steganography and Data Loss Prevention: An overlooked risk? |
title_sort |
Steganography and Data Loss Prevention: An overlooked risk? |
author |
Gutiérrez Cárdenas, Juan Manuel |
author_facet |
Gutiérrez Cárdenas, Juan Manuel |
author_role |
author |
dc.contributor.other.none.fl_str_mv |
Gutiérrez Cárdenas, Juan Manuel |
dc.contributor.author.fl_str_mv |
Gutiérrez Cárdenas, Juan Manuel |
dc.subject.en_EN.fl_str_mv |
Data protection Computer security |
topic |
Data protection Computer security Ciencias de la computación Protección de datos Seguridad informática |
dc.subject.es_PE.fl_str_mv |
Ciencias de la computación Protección de datos Seguridad informática |
description |
Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding information into picture media, to audio steganography and to the field of network steganography. All these methods entail a potential threat to the information security policies of any business; having into the data leakage threats its likely focus. In this scenario, business corporations cannot remain blind to these types of threats and should consider adequate policies and prevention techniques to avoid these risks. We have analyzed in this article the potential dangers that an organization could face in the light of these types of steganography techniques along with a review of current commercial software vendors to analyze their offers and mishaps on Data Leakage Prevention regarding steganography risks. |
publishDate |
2017 |
dc.date.accessioned.none.fl_str_mv |
2017-07-21T19:17:48Z |
dc.date.available.none.fl_str_mv |
2017-07-21T19:17:48Z |
dc.date.issued.fl_str_mv |
2017 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.other.none.fl_str_mv |
Artículo en Web of Science (ESCI) |
format |
article |
dc.identifier.citation.es_PE.fl_str_mv |
Gutiérrez-Cárdenas, J. M. (2017). Steganography and Data Loss Prevention: An overlooked risk? International Journal of Security and Its Applications, (11)4, 71-84. http://dx.doi.org/10.14257/ijsia.2017.11.4.06 |
dc.identifier.issn.none.fl_str_mv |
1738-9976 |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12724/4586 |
dc.identifier.journal.none.fl_str_mv |
International Journal of Security and Its Applications |
dc.identifier.isni.none.fl_str_mv |
0000000121541816 |
dc.identifier.wosid.none.fl_str_mv |
WOS:000401472400006 |
dc.identifier.doi.none.fl_str_mv |
https://dx.doi.org/10.14257/ijsia.2017.11.4.06 |
identifier_str_mv |
Gutiérrez-Cárdenas, J. M. (2017). Steganography and Data Loss Prevention: An overlooked risk? International Journal of Security and Its Applications, (11)4, 71-84. http://dx.doi.org/10.14257/ijsia.2017.11.4.06 1738-9976 International Journal of Security and Its Applications 0000000121541816 WOS:000401472400006 |
url |
https://hdl.handle.net/20.500.12724/4586 https://dx.doi.org/10.14257/ijsia.2017.11.4.06 |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.rights.*.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.uri.*.fl_str_mv |
https://creativecommons.org/licenses/by-nc-sa/4.0/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-sa/4.0/ |
dc.format.none.fl_str_mv |
application/html |
dc.publisher.none.fl_str_mv |
Science and Engineering Research Support Society |
dc.publisher.country.none.fl_str_mv |
KR |
publisher.none.fl_str_mv |
Science and Engineering Research Support Society |
dc.source.none.fl_str_mv |
Repositorio Institucional - Ulima Universidad de Lima reponame:ULIMA-Institucional instname:Universidad de Lima instacron:ULIMA |
instname_str |
Universidad de Lima |
instacron_str |
ULIMA |
institution |
ULIMA |
reponame_str |
ULIMA-Institucional |
collection |
ULIMA-Institucional |
bitstream.url.fl_str_mv |
https://repositorio.ulima.edu.pe/bitstream/20.500.12724/4586/2/license.txt |
bitstream.checksum.fl_str_mv |
8a4605be74aa9ea9d79846c1fba20a33 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
repository.name.fl_str_mv |
Repositorio Universidad de Lima |
repository.mail.fl_str_mv |
repositorio@ulima.edu.pe |
_version_ |
1846612167776796672 |
spelling |
Gutiérrez Cárdenas, Juan ManuelGutiérrez Cárdenas, Juan Manuel2017-07-21T19:17:48Z2017-07-21T19:17:48Z2017Gutiérrez-Cárdenas, J. M. (2017). Steganography and Data Loss Prevention: An overlooked risk? International Journal of Security and Its Applications, (11)4, 71-84. http://dx.doi.org/10.14257/ijsia.2017.11.4.061738-9976https://hdl.handle.net/20.500.12724/4586International Journal of Security and Its Applications0000000121541816WOS:000401472400006https://dx.doi.org/10.14257/ijsia.2017.11.4.06Steganography is the art or science of hiding information into a carrier in such a way that the hidden data could not be detected at first sight. Steganography techniques have broadened their scope of action, from hiding information into picture media, to audio steganography and to the field of network steganography. All these methods entail a potential threat to the information security policies of any business; having into the data leakage threats its likely focus. In this scenario, business corporations cannot remain blind to these types of threats and should consider adequate policies and prevention techniques to avoid these risks. We have analyzed in this article the potential dangers that an organization could face in the light of these types of steganography techniques along with a review of current commercial software vendors to analyze their offers and mishaps on Data Leakage Prevention regarding steganography risks.application/htmlengScience and Engineering Research Support SocietyKRinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/4.0/Repositorio Institucional - UlimaUniversidad de Limareponame:ULIMA-Institucionalinstname:Universidad de Limainstacron:ULIMAData protectionComputer securityCiencias de la computaciónProtección de datosSeguridad informáticaSteganography and Data Loss Prevention: An overlooked risk?Esteganografía y la prevención de la pérdida de datos: ¿Un riesgo pasado por alto?info:eu-repo/semantics/articleArtículo en Web of Science (ESCI)OILICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.ulima.edu.pe/bitstream/20.500.12724/4586/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD5220.500.12724/4586oai:repositorio.ulima.edu.pe:20.500.12724/45862025-03-06 19:40:01.856Repositorio Universidad de Limarepositorio@ulima.edu.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 |
score |
13.040751 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).