Misplaced Pages

Database audit

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Database audit" – news · newspapers · books · scholar · JSTOR (September 2023) (Learn how and when to remove this message)

Database auditing involves observing a database to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to access information do not access it.

References

  1. Mullins, Craig (2002). Database administration: the complete guide to practices and procedures. Addison-Wesley. p. 402. ISBN 978-0-201-74129-2. Retrieved January 19, 2011. Audit trails help promote data integrity by enabling the detection of security breaches .

Further reading

  • Gallegos, F. C. Gonzales, D. Manson, and S. Senft. Information Technology
  • Control and Audit. Second Edition. Boca Raton, Florida: CRC Press LLC, 2000.
  • Ron Ben-Natan, IBM Gold Consultant and Guardium CTO. Implementing Database Security and Auditing. Digital Press, 2005.
  • KK Mookhey (2005). IT Audit. Vol. 8. Auditing MS SQL Server Security.
  • IT Audit. Vol. 8 Murray Mazer. Database Auditing-Essential Business Practice for Today’s Risk Management May 19, 2005.
Database
Main
Languages
Security
Design
Programming
Management
Lists of
See also
WikiProject Category


Stub icon

This computer security article is a stub. You can help Misplaced Pages by expanding it.

Categories: