This technology is a novel software application for monitoring modification, deletion, and misuse of sensitive electronic documents.

About

Technology According to a 2006 FBI report, 44 percent of all computer-related crimes are carried out by people within organizations. Proprietary company information, advanced commercial or military technology, and intellectual property lost as a result of poor cybersecurity have a negative impact on the financial bottom line of many companies and government agencies. While software and firewalls exist to help prevent network intrusions from external sources, software that tracks documents within organizations is lacking. A novel, proactive approach for computer forensic investigations has been developed at Georgetown University. For every file or database entry that is created, deleted, modified, or copied, a small amount of information about the file or database entry called a "signature," is created and stored away. The fingerprints can identify a file or database entry by its content and can accommodate small format modifications. When provided with a document of interest, whether a hard copy or an electronic copy, a query signature can be created. Stored signatures are then retrieved from storage and compared to the query signature. The comparison can be performed on signatures, the fingerprints within the signatures, or on both. The invention's ability to capture user operation allows it to notify the administrator of any misuse, such as copying, modification, movement, or deletion. Advantages Advantages include detection of unauthorized network communication of sensitive information, detection of document or file misuse including copying, deletion, and modification, evidence discovery based on an individual user, ability to detect when a document is atypical for a certain user, invention can also be used for intrusion response since the signatures of files associated with the attack can be recovered and the recovered signatures can be used to examine across systems for similar intrusion and provide early detection to prevent intrusion from similar attack.  

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations