Saturday, June 8, 2019
Database Forensics and Auditing Research Paper Example | Topics and Well Written Essays - 2000 words
Database Forensics and Auditing - Research Paper ExampleThe makeup will focus on the differences between infobase forensics and databases auditing. This paper has focus on the definition of database forensic and database auditing, the regulation under database auditing, the meaning of Data Access Auditing, and Data Monitoring. The goal is to clarify the comparison between database forensic and auditing tools by analyzing some of their features. In addition, the paper will show the threats that may affect the database and how it can affect database forensic and auditing. In conclusion, databases can be secured apply a number of strategies that restrict unauthorized access, incorrect alteration of data and enhance data integrity to ignore any kind of hacking or losing data. fundament The Verizon business risk team did an investigation of 90 data breaches occurred in 2008, which revealed an overall score of 285 million stolen records. Likewise, 80% of data breaches occurred due to w eak unified information security and initiated from external sources i.e. from hackers, malicious codes etc. and 20% data breaches were initiated internally (Goldmann, n.d). Moreover, 49% of data breaches in 2008 were not diagnosed for months. Furthermore, in 2008, 81% organizations bear on from credit card breaches were not able to perform their last PCI assessment (Goldmann, n.d). Apart from deploying most up meshd technology and controls, data is still being compromised. Likewise, tactics of a hacker is categorized as 70 % credentialed users, 10% trading partners and 46% internal threats (Goldmann, n.d). Wikileaks and Stuxnet virus is one of the recent major security breaches. In summary, the change magnitude numbers of data breaches are astounding and strive to do more research for database security and protection. It shows that the laws, policies, compliance and regulations are not enough to counter these challenges. In order to protect databases via best practices, we will first differentiate between database forensics and database auditing, as there two terms will demonstrate adequate protection from potential threats and vulnerabilities. After describing these terms, we will incorporate Microsoft Log miner tool for collecting forensic evidence from a database and for auditing or reviewing database current state, SQL auditing will be incorporated. Database Forensics Database forensics that is also called Oracle forensics is relatively a new evolving field. Database forensics is conducted by different tools that facilitate Oracle Database Administrator (DBA) to re-establish actions performed on the database with the exception of deactivated forensic features. Likewise, database forensics identifies the suspect by extracting traces of an attacker from the database and revert the suspicious transactions if possible. The primary goal of database forensics is to analyze the vulnerabilities that were utilized and exploited by the threat and to rollback an y unofficial data manipulation operations. However, it is a daunting task, as attackers play safe and prefer attacks from other regions and IP addresses that involve different time zones and mediums before extracting data or compromising security controls of a database. Some of the vulnerabilities associated with database compromises include default and unchanged usernames and passwords, passwords are not long, complex or easily guessable, Database is not up to date and missing critical updated
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment