What is data exfiltration (data extrusion)? - Definition from WhatIs.com

Definition

data exfiltration (data extrusion)

Part of the Data and data management glossary:

Data exfiltration, also called data extrusion, is the unauthorized transfer of data from a computer.

Such a transfer may be manual and carried out by someone with physical access to a computer or it may be automated and carried out through malicious programming over a network.

To prevent data exfiltration, administrators should create strict IT controls for both physical and digital security. Such controls may include the use of data leak prevention (DLP) products to inspect and/or deny egress traffic from carrying unauthorized content beyond the perimeter of the enterprise and policies for role-based access control (RBAC), encryption, consumerization and password hardening.

See also: extrusion prevention, podslurping

This was last updated in April 2014
Posted by: Margaret Rouse

Related Terms

Definitions

  • data anonymization

    - The purpose of data anonymization is to make its source untraceable. Data anonymization processes include encryption, substitution, shuffing, number and data variance and nulling out data. (WhatIs.com)

  • distributed cache

    - Distributed cache is a method of configuring a data cache to span multiple servers, storing common requests and enabling quick retrieval. (WhatIs.com)

  • data exhaust

    - Data exhaust is a byproduct of user actions online and consists of the various files generated by web browsers and their plug-ins such as cookies, log files, temporary internet files and and .sol f... (WhatIs.com)

Glossaries

  • Data and data management

    - Terms related to data, including definitions about data warehousing and words and phrases about data management.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About data exfiltration (data extrusion)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.