Saturday, July 20, 2019
The Deployment of Security Policy in Information Systems Essay
Database auditing is considered as a contemporary article on database due to a vital role on the database security (Abraham, etal .,2002). There are many different of motivations that make one very excited to do this work , Nevertheless there are millions of database transactions that being executed among different of hosts all-round the organization sites. There are many question arise such as How to do some statistical analysis on database, also How to reveal out the crimes that the database is vulnerable to. Surrounding the world that fully of millions of end users part of this huge figure doing malicious activities that may create crises and Misleading ,thus, firms depend on the information that being manipulated on the database and as it has been noticed the information is strategic material on organization. With the many of database crimes it is very difficult to determine the person that is responsible of some malicious activities in the database, therefore, database auditing implementation is generated to stand behind this issues wherever a crimes appears on an organization. On other hand the database auditing implementation assist on the assessment of our organizationââ¬â¢s behaviors, attitudes, and rationality in dealing with organizational database. Within the technological competence awareness is important, different security solutions have been presented and the best solution is to audit the database logs, actions on database and any alteration on the objects of database to avoid any data modification. Through revolution of information technology (rapid, vast technology) Database auditing implementation should afford the velocity and power full to monitor the database activities. Moreover, we are in a bottle n... ...erience in analysis and design of distributed information systems, I+D Computation, Vol.1, No.1, July 2002. [8] H.G. Sol, R.L. Crosslin, Dynamic modelling of information systems II, North Holland, Amsterdam,1992. [9] P.I Rivera-Vega, R. Karlapalem, M. Ra, A mixed fragmentation approach for inintial distributed database design, Proceedings of International conference on data engineering, IEEE, 1990. [10] K. Hui, Knowledge Fusion and Constraint Solving in a Distributed Environment, PhD Thesis, University of Aberdeen, Kings College, Aberdeen, 2000. [11] R. Varadarajan, P.I. Rivera-Vega, S.B. Navathe, Data redistribution scheduling in fully connected networks, Proceedings of 27th Annual Alberton conference on communication, Control and Computing, 1989. [12] M.T. Ãâ"zsu, P. Valduriez, Principles of distributed database systems, Prentice Hall Edt, New Jersey, 1999.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.