nec-license
search
⌘Ctrlk
Computerchevron-downCivilchevron-downMechchevron-downElectricalchevron-downArchichevron-downLoksewa GK IQ
nec-license
  • Introduction
  • General Subject(Paper I)
    • Part (I) General Awareness & General Ability Test
    • Part (II) General Technical Subject
  • Technical Subject(Paper II)
    • Part (I) :- Subjects
    • Part (II) Technical Writing
  • Top Organizations
    • IT
    • NRB
      • NRB - 6th
        • Paper I (Information Technology – I)
        • Paper II (Information Technology – II)
        • Paper III (IT Security)
          • Introduction
          • 1. Fundamentals of Information Security / Cybersecurity
          • 2. Network and System Security
          • 3. Software and Application Security
          • 4. Security Models and Architecture
          • 5. Cryptography
          • 6. Hacking Techniques, Tools, and Incident Handling
            • 6.1 Hacking Techniques and Incident Handling
            • 6.2 Data Leakage and Data Protection
            • 6.3 Data Governance and Information Protection
          • 7. Information Security and IS Risk Management
          • 8. Information Security Law, Regulations, Policies, and Best Practices
      • NRB - 5th
    • NEA
    • CAAN
    • NTC
    • NOC
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Top Organizationschevron-right
  2. NRBchevron-right
  3. NRB - 6thchevron-right
  4. Paper III (IT Security)chevron-right
  5. 6. Hacking Techniques, Tools, and Incident Handling

6.2 Data Leakage and Data Protection

Previous6.1 Hacking Techniques and Incident Handlingchevron-leftNext6.3 Data Governance and Information Protectionchevron-right