What is data exfiltration (data extrusion)? - Definition from WhatIs.com

Definition

data exfiltration (data extrusion)

Part of the Data and data management glossary:

Data exfiltration, also called data extrusion, is the unauthorized transfer of data from a computer.

Such a transfer may be manual and carried out by someone with physical access to a computer or it may be automated and carried out through malicious programming over a network.

To prevent data exfiltration, administrators should create strict IT controls for both physical and digital security. Such controls may include the use of data leak prevention (DLP) products to inspect and/or deny egress traffic from carrying unauthorized content beyond the perimeter of the enterprise and policies for role-based access control (RBAC), encryption, consumerization and password hardening.

See also: extrusion prevention, podslurping

This was last updated in April 2014
Posted by: Margaret Rouse

Related Terms

Definitions

  • enterprise search

    - There are a number of kinds of enterprise search including local installations, hosted versions, and search appliances, sometimes called “search in a box.” Each has relative advantages and disadvan... (WhatIs.com)

  • framework

    - In computer systems, a framework is often a layered structure indicating what kind of programs can or should be built and how they would interrelate. (WhatIs.com)

  • knowledge-based authentication (KBA)

    - In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password. (SearchSecurity.com)

Glossaries

  • Data and data management

    - Terms related to data, including definitions about data warehousing and words and phrases about data management.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About data exfiltration (data extrusion)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.