Home
|
Previous Page
|
Next Page
Overview of Auditing
In This Chapter
Secure-Auditing Facility
Audit Events
Audit Masks
Audit Process
Audit Trail
Roles for Database Server and Audit Administration
Audit Masks and Audit Instructions
User Masks
Template Masks
Audit Instructions
Resource and Performance Implications
Suggested Minimum Set of Events to Audit
Special Auditing Considerations
Level of Auditing Granularity
Use of Various Masks
Audit Configuration
Auditing On or Off
Types of Auditing
Auditing Modes on UNIX
Auditing Modes on Windows
Properties of Audit Files on UNIX
Location of Audit Files
New Audit Files
Audit File Names
Windows Application Event Log
Windows Message Server
Error Modes for Writing to an Audit File
Halt Error Modes
Continue Error Mode
Audit Configuration and the ADTCFG File
Access to the Audit Trail
Access to Audit Files on UNIX
Access to Audit Records on Windows
Audit Analysis
Importance of Audit Analysis
Preparation for Audit Analysis
Strategies for Audit Analysis
Event Failure
Event Success
Insider Attack
Browsing
Aggregation
Responses to Identified Security Problems
DBMS Security Threats
Primary Threats
Privileged Activity Threats
Database Server Administrator
Database System Security Officer
Operating-System Administrator
Audit Analysis Officer
Shared-Memory Connection Threats on UNIX
Introduced Malicious Software Threats
Remote-Access Threats
Obsolete-User Threats
Untrusted Software Used in a Privileged Environment
Distributed Database Configuration Threats
Home
| [
Top of Page
|
Previous Page
|
Next Page
|
Contents
|
Index
]