HOME

TheInfoList



OR:

Database auditing involves
observing Observation is the active acquisition of information from a primary source. In living beings, observation employs the senses. In science, observation can also involve the perception and recording of data (information), data via the use of scienti ...
a
database In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases sp ...
so as to be aware of the actions of database
user Ancient Egyptian roles * User (ancient Egyptian official), an ancient Egyptian nomarch (governor) of the Eighth Dynasty * Useramen, an ancient Egyptian vizier also called "User" Other uses * User (computing), a person (or software) using an ...
s.
Database administrators Database administrators (DBAs) use specialized software to store and organize data. The role may include capacity planning, Installation (computer programs), installation, Computer configuration, configuration, database design, Data migration, mig ...
and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to access information do not access it.


References


Further reading

*Gallegos, F. C. Gonzales, D. Manson, and S. Senft. Information Technology *Control and Audit. Second Edition. Boca Raton, Florida: CRC Press LLC, 2000. *Ron Ben-Natan, IBM Gold Consultant and Guardium CTO. Implementing Database Security and Auditing. Digital Press, 2005. *KK Mookhey (2005). IT Audit. Vol. 8. Auditing MS SQL Server Security. *IT Audit. Vol. 8 Murray Mazer. Database Auditing-Essential Business Practice for Today’s Risk Management May 19, 2005.
Audit An audit is an "independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form when such an examination is conducted with a view to express an opinion thereon.” Auditing ...
Types of auditing Computer access control {{computer-security-stub