Author

Onur Polatcan

Abstract

Employees are stealing confidential information from its company via e-mail without detection. Invisible Witness tool can provide new assistance for an organization. Its techniques will automatically detect certain patterns across user accounts that indicate covert or malicious activities. Furthermore, this application assists the network administrator with targeted investigations. Many applications look for specific text or attachments, but Invisible Witness is the only application that is capable of creating user profiling. This application works with over 95 percent accuracy. I am sure that the Invisible Witness tool will minimize business risk to help protect valuable company information.

Library of Congress Subject Headings

Electronic mail messages--Security measures; Computer crimes--Prevention; Computer networks--Security measures

Publication Date

2011

Document Type

Thesis

Advisor

Pan, Yin

Advisor/Committee Member

Mishra, Sumita

Advisor/Committee Member

Border, Charlie

Comments

Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in December 2013.

Campus

RIT – Main Campus

Share

COinS