**Peer Review Journal ** DOI on demand of Author (Charges Apply) ** Fast Review and Publicaton Process ** Free E-Certificate to Each Author

Current Issues
     2026:7/3

International Journal of Multidisciplinary Research and Growth Evaluation

ISSN: (Print) | 2582-7138 (Online) | Impact Factor: 9.54 | Open Access

Data user interaction monitoring considerations for information security measures

Full Text (PDF)

Open Access - Free to Download

Download Full Article (PDF)

Abstract

Data leaks are not new to the information security industry. Awareness of malicious insiders trying to steal data has been always there. Much before ransomware, famous cases of insiders stealing the information, including from the government agencies, and then, certain outlets channelizing the leaked information have happened. Along with those, data leak prevention solutions have also been around. But ransomware driven data exfiltration and double extortions have forced organizations to rethink their approach. Besides this, organizations have been forced to validate the nature and granularity of the data loss, or theft, by regulation changes and to cross check the scope of the data loss to verify the accuracy of threat from an attack. However, the current approach to user monitoring is limited in scope while also missing the element of accountability. User data interaction monitoring considerations reach far beyond behavior analysis and response.    

How to Cite This Article

Anand Athavale (2023). Data user interaction monitoring considerations for information security measures . International Journal of Multidisciplinary Research and Growth Evaluation (IJMRGE), 4(2), 624-627. DOI: https://doi.org/10.54660/.IJMRGE.2023.4.2.624-627

Share This Article: