PEMBAHASAN
1.1
Tabel 1. Pencurian atau Akses Ilegal Data Perusahaan dan Sumber Lainnya
Sumber:ttp://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns
895/white_paper_c11-506224.html
3.2
3.3
LANGKAH PENCEGAHAN
Bibliography
http://www.mcafee.com/us/resources/solution-briefs/sb-protecting-
information-insider-threats.pdf
http://www.symantec.com/products-solutions/families/?fid=data-
loss-prevention
http://www.isaca.org/KnowledgeCenter/Research/ResearchDeliverables/Pages/Data-LeakPrevention.aspx
10