Database audit
![]() | This article needs attention from an expert on the subject. Please add a reason or a talk parameter to this template to explain the issue with the article.(January 2011) |
![]() | This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. (January 2011) |
Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to access information do not access it.[1]
References
KK Mookhey (2005). IT Audit. Vol. 8. Auditing MS SQL Server Security.
IT Audit. Vol. 8 Murray Mazer. Database Auditing-Essential
Business Practice for Today’s Risk Management May 19, 2005.
- Oracle. 1999. Version 8.0. Auditing Database Use. May 9, 2005.[full citation needed]
- Soft Tree Technologies. DB Audit. May 2005. Soft Tree Technologies. May 17, 2005.
Source
Gallegos, F. C. Gonzales, D. Manson, and S. Senft. Information Technology
Control and Audit. Second Edition. Boca Raton, FL: CRC Press LLC, 2000.
Ron Ben-Natan, IBM Gold Consultant and Guardium CTO. Implementing Database Security and Auditing. Digital Press, 2005.
Other works
Footnotes
- ^
Mullins, Craig (2002). Database administration: the complete guide to practices and procedures. Addison-Wesley. p. 703. ISBN 978-0-201-74129-2. Retrieved January 19, 2011.
Audit trails help promote data integrity by enabling the detection of security breaches [...].