Content deleted Content added
refactor |
No edit summary |
||
(41 intermediate revisions by 31 users not shown) | |||
Line 1:
{{Verification|date=September 2023}}
'''Database auditing''' involves [[audit|observing]] a [[database]]
{{cite book
| last = Mullins
| first = Craig
| title
| url
| accessdate = January
| year = 2002
| publisher = Addison-Wesley
| isbn =
| page = 402
| quote = Audit trails help promote data integrity by enabling the detection of ''security'' breaches [...].
}}
</ref>
==References==
{{Reflist}}
==
*Gallegos, F. C. Gonzales, D. Manson, and S. Senft. Information Technology
*Control and Audit. Second Edition. Boca Raton, Florida: CRC Press LLC, 2000.
*Ron Ben-Natan, IBM Gold Consultant and Guardium CTO. Implementing Database Security and Auditing. Digital Press, 2005.
*<cite id=Mookhey>KK Mookhey (2005). IT Audit. Vol. 8. Auditing MS SQL Server Security.</cite>
*<cite id=Mazer>IT Audit. Vol. 8 Murray Mazer. Database Auditing-Essential Business Practice for Today’s Risk Management May 19, 2005.</cite>
{{Database}}
{{DEFAULTSORT:Database Audit}}
[[Category:Database security|Audit]]
[[Category:Types of auditing]]
[[Category:Computer access control]]
{{computer-security-stub}}
|