Detection of Insider Threats and Document Misuse
Georgetown University, DC, United States
This technology is a novel software application for monitoring modification, deletion, and misuse of sensitive electronic documents within a computer network.
Primary Application Area: IT, Cyber-Security, Software
Technology Development Status: Prototype
Technology Readiness Level: TRL 4
FIGURES OF MERIT
Value Proposition: Technology detects unauthorized network communication of sensitive information and document or file misuse including copying, deletion, and modification. The program is used for evidence discovery based on an individual user and can detect when a document is atypical for a user. Program can also be used for network intrusion response.
Organization Type: Academic/Gov Lab
Showcase Booth #: 49T
GOVT/EXTERNAL FUNDING SOURCES
Government Funding/Support to Date:
Primary Sources of Funding: University
Looking for: Development / License Partners