Enterprise data breach: causes, challenges, prevention, and future directions

Long Cheng,Fang Liu,Danfeng Yao,Danfeng Daphne Yao
DOI: https://doi.org/10.1002/widm.1211
2017-06-09
Abstract:A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses serious threats to organizations, including significant reputational damage and financial losses. As the volume of data is growing exponentially and data breaches are happening more frequently than ever before, detecting and preventing data loss has become one of the most pressing security concerns for enterprises. Despite a plethora of research efforts on safeguarding sensitive information from being leaked, it remains an active research problem. This review helps interested readers to learn about enterprise data leak threats, recent data leak incidents, various state‐of‐the‐art prevention and detection techniques, new challenges, and promising solutions and exciting opportunities. WIREs Data Mining Knowl Discov 2017, 7:e1211. doi: 10.1002/widm.1211 This article is categorized under: Application Areas > Business and Industry Fundamental Concepts of Data and Knowledge > Key Design Issues in Data Mining Technologies > Prediction There are multiple points and opportunities for an enterprise to deploy effective protections to secure sensitive data against inadvertent or malicious leak threats that may appear during data storage, usage, or movement. The challenge is to understand the threats, and more importantly, the security capabilities and limitations of various prevention and detection solutions, in order for administrators to make informed security choices and decisions in practice. This review paper analyzes major data breach incidents and systematizes the body of knowledge on prevention and detection. It also points out the exciting new research opportunities related to deep learning, cloud service, privacy, and experimental reproducibility.
computer science, artificial intelligence, theory & methods
What problem does this paper attempt to address?