Critical assessment of auditing contribution to effective and efficient security in database systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Database auditing has become a very crucial aspect of security as organisations increase their adoption of database management systems (DBMS) as major asset that keeps, maintain and monitor sensitive information. Database auditing is the group of activities involved in observing a set of stored data in order to be aware of the actions of users. The work presented here outlines the main auditing techniques and methods. Some architectural based auditing systems were also considered to assess the contribution of auditing to database security. Here a framework of several stages to be used in the instigation of auditing is proposed. Some issues relating to handling of audit trails are also discussed in this paper. This paper also itemizes some of the key important impacts of the concept to security and how compliance with government policies and regulations is enforced through auditing. Once the framework is
adopted, it will provide support to database auditors and DBAs.
Original languageEnglish
Title of host publicationComputer Science and Information Technology
PublisherAIRCC Publishing
Number of pages11
Volume5
Edition7
DOIs
Publication statusPublished - Mar 2015
EventInternational Conference on Computer Science, Informatin Technology and Applications (CSITA-2015) - Bangalore, India
Duration: 28 Mar 201529 Mar 2015

Publication series

NameComputer Science Conference Proceedings
PublisherAIRCC Publishing
ISSN (Print)2231-5403

Conference

ConferenceInternational Conference on Computer Science, Informatin Technology and Applications (CSITA-2015)
Country/TerritoryIndia
CityBangalore
Period28/03/1529/03/15

Keywords

  • auditing
  • techniques
  • security
  • framework
  • procedure

Fingerprint

Dive into the research topics of 'Critical assessment of auditing contribution to effective and efficient security in database systems'. Together they form a unique fingerprint.

Cite this