This document discusses the common threats and detection methods for preventing network data leakage. It highlights the risks associated with information leakage and the potential damage it can cause to organizations. The document also covers the different types of threats, including presentation and system-based dangers, and the detection methods for each. It concludes with a discussion on intrusion prevention systems and their role in preventing network data leakage.