Tracking Digital Assets with Canary Token
DOI:
https://doi.org/10.24215/15146774e053Keywords:
cybersecurity, data leak, Data Loss Prevention, prevention, Canary Token, tracking of digital assetsAbstract
Data leakage at the computer level has been present since computers came up in the workplace. In recent years, considering the economic and noneconomic costs that this type of malicious insider attack entails, many methods and techniques have been proposed to solve this problem. Among the key reasons to implement data loss prevention mechanisms in an organization are compliance with established regulations and the protection of intellectual property. Data Loss Prevention (DLP, Data Loss Prevention) arose as a response to seeking preventive solutions to attacks by internal attackers whose objective is data leakage. It is important to implement Data Loss Prevention but, like everything related to data security and privacy, it is not a silver bullet for data leaks. For this reason, there is still a need to be able to detect these types of attacks as early as possible in order to minimize the damage and apply the respective contingency plans. Through file tracking with a canary token, it is pretended to detect data leak attacks.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Juliana Notreni, Federico Bertola, Ileana Barrionuevo, Marcelo Auquer, Leonardo Ciceri, Analia Ruhl, German Parisi, Fabian Gibellini, Ninfa M. Zea Cardenas, Ignacio Sanchez Balzaretti
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Those authors who have publications with this journal, agree with the following terms:
a. Authors will retain its copyright and will ensure the rights of first publication of its work to the journal, which will be at the same time subject to the Creative Commons Atribución-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0) allowing third parties to share the work as long as the author and the first publication on this journal is indicated.
b. Authors may elect other non-exclusive license agreements of the distribution of the published work (for example: locate it on an institutional telematics file or publish it on an monographic volume) as long as the first publication on this journal is indicated,
c. Authors are allowed and suggested to disseminate its work through the internet (for example: in institutional telematics files or in their website) before and during the submission process, which could produce interesting exchanges and increase the references of the published work. (see The effect of open Access)