Jump to content

Database audit

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Hrafn (talk | contribs) at 06:52, 7 May 2012 (Almost-completely-unreferenced how-to sections removed to talk). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to access information do not access it.[1]

References

KK Mookhey (2005). IT Audit. Vol. 8. Auditing MS SQL Server Security.
IT Audit. Vol. 8 Murray Mazer. Database Auditing-Essential Business Practice for Today’s Risk Management May 19, 2005.

Source

Gallegos, F. C. Gonzales, D. Manson, and S. Senft. Information Technology Control and Audit. Second Edition. Boca Raton, FL: CRC Press LLC, 2000.
Ron Ben-Natan, IBM Gold Consultant and Guardium CTO. Implementing Database Security and Auditing. Digital Press, 2005.

Other works

Footnotes

  1. ^ Mullins, Craig (2002). Database administration: the complete guide to practices and procedures. Addison-Wesley. p. 703. ISBN 978-0-201-74129-2. Retrieved January 19, 2011. Audit trails help promote data integrity by enabling the detection of security breaches [...].