Abstract
Employees are stealing confidential information from its company via e-mail without detection. Invisible Witness tool can provide new assistance for an organization. Its techniques will automatically detect certain patterns across user accounts that indicate covert or malicious activities. Furthermore, this application assists the network administrator with targeted investigations. Many applications look for specific text or attachments, but Invisible Witness is the only application that is capable of creating user profiling. This application works with over 95 percent accuracy. I am sure that the Invisible Witness tool will minimize business risk to help protect valuable company information.
Library of Congress Subject Headings
Electronic mail messages--Security measures; Computer crimes--Prevention; Computer networks--Security measures
Publication Date
2011
Document Type
Thesis
Advisor
Pan, Yin
Advisor/Committee Member
Mishra, Sumita
Advisor/Committee Member
Border, Charlie
Recommended Citation
Polatcan, Onur, "E-mail behavior profiling: Based on attachment and language text" (2011). Thesis. Rochester Institute of Technology. Accessed from
https://repository.rit.edu/theses/623
Campus
RIT – Main Campus
Comments
Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in December 2013.