Definition

data exfiltration (data extrusion)

Part of the Data and data management glossary:

Data exfiltration, also called data extrusion, is the unauthorized transfer of data from a computer.

Such a transfer may be manual and carried out by someone with physical access to a computer or it may be automated and carried out through malicious programming over a network.

To prevent data exfiltration, administrators should create strict IT controls for both physical and digital security. Such controls may include the use of data leak prevention (DLP) products to inspect and/or deny egress traffic from carrying unauthorized content beyond the perimeter of the enterprise and policies for role-based access control (RBAC), encryption, consumerization and password hardening.

See also: extrusion prevention, podslurping

This was last updated in April 2014
Posted by: Margaret Rouse

Related Terms

Definitions

  • metadata

    - Metadata is data that describes other data. Meta is a prefix that in most information technology usages means "an underlying definition or description." (WhatIs.com)

  • SQL-on-Hadoop

    - SQL-on-Hadoop is a class of analytical application tools that combine established SQL-style querying with newer Hadoop data framework elements. (SearchDataManagement.com)

  • statistical analysis

    - Statistical analysis is a component of data analytics. In the context of business intelligence (BI), statistical analysis involves collecting and scrutinizing every single data sample in a set of i... (WhatIs.com)

Glossaries

  • Data and data management

    - Terms related to data, including definitions about data warehousing and words and phrases about data management.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About data exfiltration (data extrusion)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.