zoukankan      html  css  js  c++  java
  • Database Security: Auditing

    Database auditing is used to track database access and user activity.

    Auditing can be used to identify who accessed database objects, what actions were performed, and what data was changed.

    Database auditing does not prevent security breaches, but it does provide a way to identify if breaches have occurred.

    Auditing plays a central role in a comprehensive database security plan. The primary weakness of the audit process is the time delay between when data is recorded and when analysis is performed.
    Consequently, breaches and other unauthorized activities are identified after the fact,making it difficult to mitigate adverse effects in a timely manner. However, solutions are being introduced that allow for real-time monitoring of database activity looking for patterned events
    indicative of potential breaches and enacting real-time notification to database administrators when such actions occur. Whatever the case, database auditing is a necessary process, and students must be made aware of the need for continuous monitoring of database log files.

  • 相关阅读:
    第二周总结
    币值转换
    抓老鼠
    秋季学习总结
    第七周作业
    第六周作业
    2019年春季第五周
    2019年春季学期第四周作业
    2019年春季学期第三周作业
    2019年春季学期第二周作业
  • 原文地址:https://www.cnblogs.com/hbuwyg/p/11032060.html
Copyright © 2011-2022 走看看