What is data exfiltration (data extrusion)? - Definition from WhatIs.com

Definition

data exfiltration (data extrusion)

Part of the Data and data management glossary:

Data exfiltration, also called data extrusion, is the unauthorized transfer of data from a computer.

Such a transfer may be manual and carried out by someone with physical access to a computer or it may be automated and carried out through malicious programming over a network.

To prevent data exfiltration, administrators should create strict IT controls for both physical and digital security. Such controls may include the use of data leak prevention (DLP) products to inspect and/or deny egress traffic from carrying unauthorized content beyond the perimeter of the enterprise and policies for role-based access control (RBAC), encryption, consumerization and password hardening.

See also: extrusion prevention, podslurping

This was last updated in April 2014
Posted by: Margaret Rouse

Related Terms

Definitions

  • enterprise search

    - Enterprise search is the organized retrieval of structured and unstructured data within an organization. (WhatIs.com)

  • data profiling

    - Data profiling, also called data archeology, is the statistical analysis and assessment of the quality of data values within a data set for consistency, uniqueness and logic.   (SearchDataManagement.com)

  • health informatics

    - Health informatics, a term that includes narrower fields such as clinical and nursing informatics, is the study and management of health information. (SearchHealthIT.com)

Glossaries

  • Data and data management

    - Terms related to data, including definitions about data warehousing and words and phrases about data management.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About data exfiltration (data extrusion)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.