Database audit
Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to access information do not access it.[1]
References
- ↑ Mullins, Craig (2002). Database administration: the complete guide to practices and procedures. Addison-Wesley. p. 703. ISBN 978-0-201-74129-2. Retrieved January 19, 2011.
Audit trails help promote data integrity by enabling the detection of security breaches [...].
Further reading
- Gallegos, F. C. Gonzales, D. Manson, and S. Senft. Information Technology
- Control and Audit. Second Edition. Boca Raton, FL: CRC Press LLC, 2000.
- Ron Ben-Natan, IBM Gold Consultant and Guardium CTO. Implementing Database Security and Auditing. Digital Press, 2005.
- KK Mookhey (2005). IT Audit. Vol. 8. Auditing MS SQL Server Security.
- IT Audit. Vol. 8 Murray Mazer. Database Auditing-Essential Business Practice for Today’s Risk Management May 19, 2005.
- Oracle. 1999. Version 8.0. Auditing Database Use. May 9, 2005.
- Soft Tree Technologies. DB Audit. May 2005. Soft Tree Technologies. May 17, 2005.
- AuditDatabase 2006. Free web application that automates the generation of audit triggers.
|
This article is issued from Wikipedia - version of the Saturday, May 16, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.