Free Assessment: 159 Data Loss Prevention Things You Should Know

What is involved in Data Loss Prevention

Find out what the related areas are that Data Loss Prevention connects with, associates with, correlates with or affects, and which require thought, deliberation, analysis, review and discussion. This unique checklist stands out in a sense that it is not per-se designed to give answers, but to engage the reader and lay out a Data Loss Prevention thinking-frame.

How far is your company on its Data Loss Prevention journey?

Take this short survey to gauge your organization’s progress toward Data Loss Prevention leadership. Learn your strongest and weakest areas, and what you can do now to create a strategy that delivers results.

To address the criteria in this checklist for your organization, extensive selected resources are provided for sources of further research and information.

Start the Checklist

Below you will find a quick checklist designed to help you think about which Data Loss Prevention related domains to cover and 159 essential critical questions to check off in that domain.

The following domains are covered:

Data Loss Prevention, Data loss prevention software, Antivirus software, Bayesian analysis, Browser security, Chinese wall, Client–server model, Comparison of computer viruses, Computer and network surveillance, Computer virus, Computer worm, Data leak, Data loss, Data retention, Defensive computing, False positives and false negatives, Form grabbing, Information security, Instant Messaging, Internet bot, Internet café, Internet security, Intrusion detection system, Intrusion prevention system, Keystroke logging, Linux malware, Machine learning, Macro virus, Metadata removal tool, Mobile malware, Mobile security, Network security, Palm OS viruses, Privacy-invasive software, Regular expression, Rogue security software, Timeline of computer viruses and worms, Trojan horse, User activity monitoring, Web threat:

Data Loss Prevention Critical Criteria:

Scrutinze Data Loss Prevention quality and achieve a single Data Loss Prevention view and bringing data together.

– You do not want to be informed of a data loss incident from the users themselves or from the data protection authority. Do you have technology that can detect breaches that have taken place; forensics available to investigate how the data was lost (or changed); and can you go back in time with full user logs and identify the incident to understand its scope and impact?

– Does the tool in use allow the ability to search for registered data (e.g., database data) or specific files by name, hash marks, or watermarks, and to detect partial-file-content matches?

– Do you have guidelines or a policy in place defining the parameters for employees working on files outside of the office?

– Does the tool we use provide the ability to delegate role-based user administration to Agency Administrator by domain?

– Is website access and maintenance information accessible by the ED and at least one other person (e.g., Board Chair)?

– Does the tool we use provide the ability for mobile devices to access critical portions of the management interface?

– Are there automated audit tools being used to determine the effectiveness of data loss prevention programs?

– What is your company doing to take advantage of automation to improve data & information integrity?

– Does the tool we use allow the ability to add custom number templates (e.g., customer/client IDs)?

– Does the tool in use have a quarantine that includes the ability to collect reports into cases?

– What are the best open source solutions for data loss prevention?

– What is the impact of the economy on executing our audit plans?

– What does off-site mean in your organization?

– Who are the data loss prevention vendors?

– Are all computers password protected?

– What about policies and standards?

– How many copies must be off-line?

– Why Data Loss Prevention?

– Where is the data?

– What is the data?

Data loss prevention software Critical Criteria:

Learn from Data loss prevention software quality and prioritize challenges of Data loss prevention software.

– What are the success criteria that will indicate that Data Loss Prevention objectives have been met and the benefits delivered?

– What are our needs in relation to Data Loss Prevention skills, labor, equipment, and markets?

– Do we have past Data Loss Prevention Successes?

Antivirus software Critical Criteria:

Adapt Antivirus software management and prioritize challenges of Antivirus software.

– Can Management personnel recognize the monetary benefit of Data Loss Prevention?

– What are the Essentials of Internal Data Loss Prevention Management?

Bayesian analysis Critical Criteria:

Group Bayesian analysis planning and customize techniques for implementing Bayesian analysis controls.

– What are your results for key measures or indicators of the accomplishment of your Data Loss Prevention strategy and action plans, including building and strengthening core competencies?

– How does the organization define, manage, and improve its Data Loss Prevention processes?

– How do we Identify specific Data Loss Prevention investment and emerging trends?

Browser security Critical Criteria:

Confer re Browser security tactics and budget for Browser security challenges.

– How do we measure improved Data Loss Prevention service perception, and satisfaction?

– What are the business goals Data Loss Prevention is aiming to achieve?

– Who needs to know about Data Loss Prevention ?

Chinese wall Critical Criteria:

Paraphrase Chinese wall decisions and optimize Chinese wall leadership as a key to advancement.

– Does Data Loss Prevention systematically track and analyze outcomes for accountability and quality improvement?

– How will we insure seamless interoperability of Data Loss Prevention moving forward?

– What will drive Data Loss Prevention change?

Client–server model Critical Criteria:

Grasp Client–server model planning and prioritize challenges of Client–server model.

– Are assumptions made in Data Loss Prevention stated explicitly?

– How do we Lead with Data Loss Prevention in Mind?

Comparison of computer viruses Critical Criteria:

Infer Comparison of computer viruses governance and find out.

– Think of your Data Loss Prevention project. what are the main functions?

Computer and network surveillance Critical Criteria:

Substantiate Computer and network surveillance decisions and frame using storytelling to create more compelling Computer and network surveillance projects.

– What is the total cost related to deploying Data Loss Prevention, including any consulting or professional services?

– Do we monitor the Data Loss Prevention decisions made and fine tune them as they evolve?

Computer virus Critical Criteria:

Mix Computer virus results and ask questions.

– Will Data Loss Prevention have an impact on current business continuity, disaster recovery processes and/or infrastructure?

– How do we go about Comparing Data Loss Prevention approaches/solutions?

Computer worm Critical Criteria:

See the value of Computer worm projects and ask what if.

– How would one define Data Loss Prevention leadership?

– How much does Data Loss Prevention help?

Data leak Critical Criteria:

Ventilate your thoughts about Data leak strategies and get answers.

– If our GDPR management is conducted by an external company; who would be fined in the event of a personal data leak? Is the responsibility born by us; or can it be contractually transferred to the provider?

– Is a technical solution for data loss prevention -i.e., systems designed to automatically monitor for data leakage -considered essential to enterprise risk management?

– Where do ideas that reach policy makers and planners as proposals for Data Loss Prevention strengthening and reform actually originate?

– How will our organization address the key risk areas of security, resilience and data leakage?

– Is our organization covered against data leakage, loss and rogue employees?

Data loss Critical Criteria:

Systematize Data loss leadership and sort Data loss activities.

– Does the tool in use have the ability to integrate with Active Directory or sync directory on a scheduled basis, or do look-ups within a multi-domain forest in the sub-100-millisecond range?

– Are reusable policy objects separate, referenced databases, files, or subroutines so that they can be reused in multiple policies, but centrally updated?

– Does the tool we use provide the ability to send and receive secure email without browser plug ins or client software?

– Are there audit areas that are candidates for elimination or reduced audit coverage to accommodate strained budgets?

– What types of controls and associated technologies are considered essential to auditing third party processing?

– Are we protecting our data properly at rest if an attacker compromises our applications or systems?

– Will the Deployment be applied to all of the traffic of data in use, or in motion, or at rest?

– Does the tool we use support the ability to configure user content management alerts?

– How do we know that any Data Loss Prevention analysis is complete and comprehensive?

– How do we maintaining integrity between communication ports and firewalls?

– What are all the egress points present in the network?

– When was your last SWOT analysis for Internal Audit?

– Are all computer files backed up on a regular basis?

– What sensitive data do you hold?

– Why Bother With A DP SLA?

Data retention Critical Criteria:

Brainstorm over Data retention quality and report on setting up Data retention without losing ground.

– Traditional data protection principles include fair and lawful data processing; data collection for specified, explicit, and legitimate purposes; accurate and kept up-to-date data; data retention for no longer than necessary. Are additional principles and requirements necessary for IoT applications?

– What are all of our Data Loss Prevention domains and what do they do?

– What is our formula for success in Data Loss Prevention ?

– Is Data Loss Prevention Required?

Defensive computing Critical Criteria:

Adapt Defensive computing strategies and interpret which customers can’t participate in Defensive computing because they lack skills.

– How do senior leaders actions reflect a commitment to the organizations Data Loss Prevention values?

– Why is Data Loss Prevention important for you now?

False positives and false negatives Critical Criteria:

Be clear about False positives and false negatives quality and get going.

– Who will be responsible for making the decisions to include or exclude requested changes once Data Loss Prevention is underway?

– Meeting the challenge: are missed Data Loss Prevention opportunities costing us money?

– What are the usability implications of Data Loss Prevention actions?

Form grabbing Critical Criteria:

Differentiate Form grabbing decisions and question.

– What are your current levels and trends in key measures or indicators of Data Loss Prevention product and process performance that are important to and directly serve your customers? how do these results compare with the performance of your competitors and other organizations with similar offerings?

– What will be the consequences to the business (financial, reputation etc) if Data Loss Prevention does not go ahead or fails to deliver the objectives?

– Is the Data Loss Prevention organization completing tasks effectively and efficiently?

Information security Critical Criteria:

Examine Information security goals and adjust implementation of Information security.

– Has specific responsibility been assigned for the execution of business continuity and disaster recovery plans (either within or outside of the information security function)?

– Is a risk treatment plan formulated to identify the appropriate mgmt action, resources, responsibilities and priorities for managing information security risks?

– Are Human Resources subject to screening, and do they have terms and conditions of employment defining their information security responsibilities?

– What other organizational variables, such as reward systems or communication systems, affect the performance of this Data Loss Prevention process?

– If a survey was done with asking organizations; Is there a line between your information technology department and your information security department?

– Do suitable policies for the information security exist for all critical assets of the value added chain (indication of completeness of policies, Ico )?

– Is mgmt able to determine whether security activities delegated to people or implemented by information security are performing as expected?

– Is the documented Information Security Mgmt System (ISMS) established, implemented, operated, monitored, reviewed, maintained and improved?

– Are information security roles and responsibilities coordinated and aligned with internal roles and external partners?

– Is there an up-to-date information security awareness and training program in place for all system users?

– Have standards for information security across all entities been established or codified into regulations?

– Is an organizational information security policy established?

– How to achieve a satisfied level of information security?

– Does your company have an information security officer?

Instant Messaging Critical Criteria:

Facilitate Instant Messaging risks and summarize a clear Instant Messaging focus.

– Are you looking for a vendor to provide instant messaging built into the solution so users of the system can instant message each other?

– How do we maintain Data Loss Preventions Integrity?

Internet bot Critical Criteria:

Focus on Internet bot decisions and slay a dragon.

– Who will be responsible for deciding whether Data Loss Prevention goes ahead or not after the initial investigations?

– What are your most important goals for the strategic Data Loss Prevention objectives?

– What sources do you use to gather information for a Data Loss Prevention study?

Internet café Critical Criteria:

Graph Internet café risks and report on setting up Internet café without losing ground.

– What business benefits will Data Loss Prevention goals deliver if achieved?

Internet security Critical Criteria:

Win new insights about Internet security strategies and pay attention to the small things.

– Think about the kind of project structure that would be appropriate for your Data Loss Prevention project. should it be formal and complex, or can it be less formal and relatively simple?

– Do Data Loss Prevention rules make a reasonable demand on a users capabilities?

Intrusion detection system Critical Criteria:

Match Intrusion detection system risks and inform on and uncover unspoken needs and breakthrough Intrusion detection system results.

– Can intrusion detection systems be configured to ignore activity that is generated by authorized scanner operation?

– What is a limitation of a server-based intrusion detection system (ids)?

– Will Data Loss Prevention deliverables need to be tested and, if so, by whom?

– Does the Data Loss Prevention task fit the clients priorities?

Intrusion prevention system Critical Criteria:

Derive from Intrusion prevention system outcomes and don’t overlook the obvious.

– Are security alerts from the intrusion detection or intrusion prevention system (ids/ips) continuously monitored, and are the latest ids/ips signatures installed?

– Who is responsible for ensuring appropriate resources (time, people and money) are allocated to Data Loss Prevention?

– Is a intrusion detection or intrusion prevention system used on the network?

Keystroke logging Critical Criteria:

Investigate Keystroke logging quality and define Keystroke logging competency-based leadership.

– Think about the people you identified for your Data Loss Prevention project and the project responsibilities you would assign to them. what kind of training do you think they would need to perform these responsibilities effectively?

– How likely is the current Data Loss Prevention plan to come in on schedule or on budget?

– How do we keep improving Data Loss Prevention?

Linux malware Critical Criteria:

Administer Linux malware projects and finalize specific methods for Linux malware acceptance.

– How do you determine the key elements that affect Data Loss Prevention workforce satisfaction? how are these elements determined for different workforce groups and segments?

– What is our Data Loss Prevention Strategy?

Machine learning Critical Criteria:

Guide Machine learning projects and create a map for yourself.

– What are the long-term implications of other disruptive technologies (e.g., machine learning, robotics, data analytics) converging with blockchain development?

– Does Data Loss Prevention analysis isolate the fundamental causes of problems?

– Are there Data Loss Prevention Models?

Macro virus Critical Criteria:

Investigate Macro virus decisions and gather Macro virus models .

– Who are the people involved in developing and implementing Data Loss Prevention?

– Which individuals, teams or departments will be involved in Data Loss Prevention?

– Have all basic functions of Data Loss Prevention been defined?

Metadata removal tool Critical Criteria:

Graph Metadata removal tool quality and gather practices for scaling Metadata removal tool.

– What management system can we use to leverage the Data Loss Prevention experience, ideas, and concerns of the people closest to the work to be done?

– Is maximizing Data Loss Prevention protection the same as minimizing Data Loss Prevention loss?

Mobile malware Critical Criteria:

Design Mobile malware governance and intervene in Mobile malware processes and leadership.

– How will you measure your Data Loss Prevention effectiveness?

– How can skill-level changes improve Data Loss Prevention?

Mobile security Critical Criteria:

Deliberate over Mobile security issues and raise human resource and employment practices for Mobile security.

– Consider your own Data Loss Prevention project. what types of organizational problems do you think might be causing or affecting your problem, based on the work done so far?

Network security Critical Criteria:

Value Network security leadership and find answers.

– Do we Make sure to ask about our vendors customer satisfaction rating and references in our particular industry. If the vendor does not know its own rating, it may be a red flag that youre dealing with a company that does not put Customer Service at the forefront. How would a company know what to improve if it had no idea what areas customers felt were lacking?

– How can we incorporate support to ensure safe and effective use of Data Loss Prevention into the services that we provide?

– What are the top 3 things at the forefront of our Data Loss Prevention agendas for the next 3 years?

– Are the disaster recovery plan (DRP) and the business contingency plan (BCP) tested annually?

Palm OS viruses Critical Criteria:

Derive from Palm OS viruses planning and probe using an integrated framework to make sure Palm OS viruses is getting what it needs.

– What are the barriers to increased Data Loss Prevention production?

Privacy-invasive software Critical Criteria:

Deliberate Privacy-invasive software leadership and explore and align the progress in Privacy-invasive software.

– How do you incorporate cycle time, productivity, cost control, and other efficiency and effectiveness factors into these Data Loss Prevention processes?

Regular expression Critical Criteria:

Accommodate Regular expression strategies and separate what are the business goals Regular expression is aiming to achieve.

– Does the tool we use provide the ability to combine multiple Boolean operators and regular expressions into policies?

– Do several people in different organizational units assist with the Data Loss Prevention process?

– Can we do Data Loss Prevention without complex (expensive) analysis?

Rogue security software Critical Criteria:

Give examples of Rogue security software tasks and work towards be a leading Rogue security software expert.

– Are there any easy-to-implement alternatives to Data Loss Prevention? Sometimes other solutions are available that do not require the cost implications of a full-blown project?

Timeline of computer viruses and worms Critical Criteria:

Weigh in on Timeline of computer viruses and worms visions and adjust implementation of Timeline of computer viruses and worms.

– What are internal and external Data Loss Prevention relations?

Trojan horse Critical Criteria:

X-ray Trojan horse planning and intervene in Trojan horse processes and leadership.

– How can you measure Data Loss Prevention in a systematic way?

User activity monitoring Critical Criteria:

Deduce User activity monitoring risks and use obstacles to break out of ruts.

– Does Data Loss Prevention analysis show the relationships among important Data Loss Prevention factors?

– Have the types of risks that may impact Data Loss Prevention been identified and analyzed?

Web threat Critical Criteria:

Test Web threat tasks and catalog what business benefits will Web threat goals deliver if achieved.

– Do the Data Loss Prevention decisions we make today help people and the planet tomorrow?

Conclusion:

This quick readiness checklist is a selected resource to help you move forward. Learn more about how to achieve comprehensive insights with the Data Loss Prevention Self Assessment:

store.theartofservice.com/Data-Loss-Prevention-Third-Edition-Revised/

Author: Gerard Blokdijk

CEO at The Art of Service | theartofservice.com

gerard.blokdijk@theartofservice.com

www.linkedin.com/in/gerardblokdijk

Gerard is the CEO at The Art of Service. He has been providing information technology insights, talks, tools and products to organizations in a wide range of industries for over 25 years. Gerard is a widely recognized and respected information expert. Gerard founded The Art of Service consulting business in 2000. Gerard has authored numerous published books to date.

External links:

To address the criteria in this checklist, these selected resources are provided for sources of further research and information:

Data Loss Prevention External links:

Data Loss Prevention | Symantec Connect
www.symantec.com/connect/products/data-loss-prevention?page=30

GTB Technologies – Enterprise Data Loss Prevention …
gttb.com

[PDF]Data Loss Prevention – WatchGuard
www.watchguard.com/docs/datasheet/wg_data_loss_prevention.pdf

Data loss prevention software External links:

Data Loss Prevention Software from Virtru
www.virtru.com/gmail-encryption/data-loss-prevention-software

Data loss prevention software
Data loss prevention solution is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage).

Data Loss Prevention Software | Safetica
safeticausa.com

Antivirus software External links:

Consumer antivirus software providers for Windows
support.microsoft.com/en-us/help/18900

The best antivirus software of 2017 | TechRadar
www.techradar.com/news/top-10-best-antivirus-software-for-2016

Spybot – Search & Destroy Anti-malware & Antivirus Software
www.safer-networking.org

Bayesian analysis External links:

Bayesian Analysis — from Wolfram MathWorld
mathworld.wolfram.com/BayesianAnalysis.html

Bayesian Analysis (BA) – Project Euclid
projecteuclid.org/euclid.ba

Bayesian analysis. (eJournal / eMagazine, 2006) …
www.worldcat.org/title/bayesian-analysis/oclc/64254345

Browser security External links:

[PDF]NAIC/NIPR Browser Security Upgrade
www.naic.org/documents/index_help_cc_tls_upgrade.pdf

Browser security features compared – CNET
www.cnet.com/news/browser-security-features-compared

NSS Labs 2017 Web Browser Security Comparative Reports
www.microsoft.com/en-us/download/details.aspx?id=54773

Chinese wall External links:

What is an Chinese Wall? – SecuritiesCE – SecuritiesCE
www.securitiesce.com/definition/5423/chinese-wall

Chinese Wall Art | eBay
www.ebay.com/bhp/chinese-wall-art

Comparison of computer viruses External links:

Comparison of computer viruses – update.revolvy.com
update.revolvy.com/topic/Comparison of computer viruses

Computer and network surveillance External links:

Computer and network surveillance | The Meaning
the-meaning.com/computer_and_network_surveillance.html

Computer and network surveillance – revolvy.com
www.revolvy.com/topic/Computer and network surveillance

Computer and network surveillance!! – YouTube
www.youtube.com/watch?v=PI3St5LPsQ0

Computer virus External links:

Computer Virus – ABC News
abcnews.go.com/topics/business/technology/computer-virus.htm

Free computer viruses Essays and Papers – 123HelpMe
www.123helpme.com/search.asp?text=computer+viruses

Title: Computer Virus – Internet Speculative Fiction Database
www.isfdb.org/cgi-bin/title.cgi?91962

Computer worm External links:

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
Reference: en.wikipedia.org/wiki/Worm_(software)

[PDF]Computer Worms – School of Computing
www.cs.clemson.edu/course/cpsc420/material/Malware/Worms.pdf

What is computer worm? – Definition from WhatIs.com
searchsecurity.techtarget.com/definition/worm

Data leak External links:

Data Leak – FREE download Data Leak
data-leak.winsite.com/titles

Data Leak – Home | Facebook
www.facebook.com/dataleakrecords

Biggest Financial Data Leak in History Video – ABC News
abcnews.go.com/WNT/video/biggest-financial-data-leak-history-38150176

Data loss External links:

Technical Overview of DLP (data loss prevention) in Exchange
technet.microsoft.com/en-us/library/jj150527(v=exchg.160).aspx

Data Loss Prevention & Protection | Symantec
www.symantec.com/products/data-loss-prevention

How to: New DLP (data loss prevention) policy template
technet.microsoft.com/en-us/library/jj150515(v=exchg.150).aspx

Data retention External links:

[PDF]Data Retention and Destruction Policy
vcsa.ucr.edu/docs/dataretentionanddestructionpolicy.pdf

[DOC]Data Retention Policy – hr.waddell.com
hr.waddell.com/docs/DataRetentionPolicy.doc

Data Retention – AbeBooks
www.abebooks.com/book-search/title/data-retention

Defensive computing External links:

Defensive computing – O’Reilly Media
www.oreilly.com/ideas/defensive-computing

The pillars of Defensive Computing – CNET
www.cnet.com/news/the-pillars-of-defensive-computing

Defensive Computing – Information Security for Individuals
www.defensivecomputing.io

False positives and false negatives External links:

False Positives and False Negatives – Math is Fun
www.mathsisfun.com/data/probability-false-negatives-positives.html

Medical False Positives and False Negatives – …
brownmath.com/stat/falsepos.htm

Information security External links:

[PDF]TITLE: INFORMATION SECURITY MANAGEMENT …
www.nyp.org/pdf/vendor-policy-I210.pdf

Federal Information Security Management Act of 2002 – NIST
csrc.nist.gov/topics/laws-and-regulations/laws/fisma

Managed Security Services | Information Security Solutions
www.intelisecure.com

Instant Messaging External links:

ICE Instant Messaging
www.theice.com/technology/instant-message

Business Instant Messaging Software | LivePerson
www.liveperson.com/liveengage

Internet bot External links:

MOST DANGEROUS INTERNET BOT – YouTube
www.youtube.com/watch?v=DQSaCC8a988

CAPTCHA Seminar Report | Internet Bot | …
www.scribd.com/document/144104434/CAPTCHA-Seminar-Report

Internet Bot | Know Your Meme
knowyourmeme.com/memes/subcultures/internet-bot

Internet café External links:

Internet café busted for gambling | KSL.com
www.ksl.com/?nid=148&sid=7744698

Internet security External links:

Internet Security, Protection and Support Plans by Verizon
www.verizon.com/home/utilities/security

Center for Internet Security – Official Site
www.cisecurity.org

Internet Security | Home Network Protection | Avast
www.avast.com/internet-security

Intrusion detection system External links:

[PDF]Section 9. Intrusion Detection Systems
ia.signal.army.mil/docs/DOD5220_22M/cp5sec9.pdf

Intrusion Detection Systems – CERIAS
www.cerias.purdue.edu/about/history/coast_resources/idcontent/ids.html

[PDF]Intrusion Detection System Sensor Protection Profile
www.commoncriteriaportal.org/files/ppfiles/PP_IDS_SEN_V1.2.pdf

Intrusion prevention system External links:

How does an Intrusion Prevention System (IPS) work? – …
www.quora.com/How-does-an-Intrusion-Prevention-System-IPS-work

Wireless Intrusion Prevention System (WIPS) | …
www.watchguard.com/wgrd-products/access-points/wips

Intrusion prevention system
Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it.

Keystroke logging External links:

Keystroke Logging | Mobistealth
www.mobistealth.com/features/keystroke-logging

What is Keystroke Logging (Keylogger)? Webopedia …
www.webopedia.com/TERM/K/keylogger.html

Keystroke Logging – LifeLock
www.lifelock.com/education/keystroke-logging

Linux malware External links:

Linux Malware Targets IoT Devices | IoT Security Headlines
www.trendmicro.com/us/iot-security/special/120

Machine learning External links:

Machine Learning Server Overview – microsoft.com
www.microsoft.com/en-us/sql-server/machinelearningserver

Microsoft Azure Machine Learning Studio
studio.azureml.net

Appen: high-quality training data for machine learning
appen.com

Macro virus External links:

What to do if your Word for Mac has a macro virus
support.microsoft.com/en-us/help/291824

What is Macro Viruses – oocities.org
www.oocities.org/mcistaro/What_is_Micro_Viruses.html

Macro Virus – FREE download Macro Virus
macro-virus.winsite.com/titles

Metadata removal tool External links:

BatchPurifier LITE – Free Metadata Removal Tool
www.digitalconfidence.com/downloads.html

Mobile security External links:

ADP Mobile Security
mobile.adp.com/security

Find Your Lost or Stolen Android Device | AVG Mobile Security
www.avgmobilation.com

Vipre Mobile Security
www.vipremobile.com

Network security External links:

| Redhawk Network Security
redhawksecurity.com

Medicine Bow Technologies – Network Security Colorado
www.medbowtech.com

Network Security Chapter 3 Flashcards | Quizlet
quizlet.com/1834759/network-security-chapter-3-flash-cards

Palm OS viruses External links:

Palm OS viruses – Infogalactic: the planetary knowledge core
infogalactic.com/info/Palm_OS_viruses

Palm OS viruses – broom02.revolvy.com
broom02.revolvy.com/topic/Palm OS viruses

Palm OS virusesの意味・使い方 – 英和辞典 Weblio辞書
ejje.weblio.jp/content/Palm+OS+viruses

Privacy-invasive software External links:

PIS – Privacy-Invasive Software | AcronymFinder
www.acronymfinder.com/Privacy_Invasive-Software-(PIS).html

CiteSeerX — Privacy-Invasive Software in File-Sharing …
citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.560

Privacy-invasive Software – FRS
www.frs.org/glossary/privacy-invasive-software

Regular expression External links:

Regular Expression Examples
www.regular-expressions.info/examples.html

Easy Regular Expression Builder – RegexBuddy
www.regexbuddy.com/create.html

Replace text using regular expression – MATLAB regexprep
www.mathworks.com/help/matlab/ref/regexprep.html

Timeline of computer viruses and worms External links:

Timeline of computer viruses and worms – WOW.com
www.wow.com/wiki/Timeline_of_computer_viruses_and_worms

Timeline of computer viruses and worms – Revolvy
www.revolvy.com/topic/Timeline of computer viruses and worms

Timeline of computer viruses and worms – Sensagent.com
dictionary.sensagent.com/TIMELINE OF COMPUTER VIRUSES AND WORMS/en-en

Trojan horse External links:

The Trojan Horse – Restaurant & Tavern
www.thetrojanhorse.com

Trojan horse | Story & Facts | Britannica.com
www.britannica.com/topic/Trojan-horse

User activity monitoring External links:

User Activity Monitoring Software Overview | TrustRadius
www.trustradius.com/user-activity-monitoring

User Activity Monitoring and Employee Monitoring …
www.observeit.com/product/user-activity-monitoring

Web threat External links:

Security Intelligence Research – Web Threat Analysis
apac.trendmicro.com/apac/security-intelligence

6.8 Web Threat Protection Flashcards | Quizlet
quizlet.com/28623835/68-web-threat-protection-flash-cards

RSA Web Threat Detection | RSA Link
community.rsa.com/community/products/web-threat-detection