Page 192 - DCAP508_DATABASE_ADMINISTRATION
P. 192
Database Administration
Notes Privileged users monitoring – DBAs, root, system admins – which have access to access
and alter data either via the application either by logging in at the system OS or local
console.
The preventive security solutions and controls such as encryption and access management,
are not effective for authorized/legitimate user access.
Database Firewall includes a complete set of predefined, customizable security and audit
policies
13.8 Keywords
Application Activity Monitoring: The primary purpose of application activity monitoring is to
provide a greater level of end-user accountability and detect fraud (and other abuses of legitimate
access) that occurs via enterprise applications, rather than via direct access to the database.
Database activity monitoring: Database activity monitoring (DAM) / Database Firewall (DBF)
monitors database activity to identify fraudulent, illegal or other undesirable behavior, by
using embedded knowledge about database structures and access to analytics and reporting
and enforce policies and control.
Database Firewall: A tool that includes a complete set of predefined, customizable security and
audit policies.
Privileged user Monitoring: This includes auditing all activities and transactions; identifying
anomalous activities (such as viewing sensitive data, or creating new accounts with superuser
privileges); and reconciling observed activities (such as adding or deleting tables) with authorized
change requests.
SQL injection: It is a type of attack used to exploit bad coding practices in applications that use
relational databases.
User Activity Monitoring: in order to track the users and the applications that connect to the
database.
13.9 Review Questions
1. Discuss the need of database monitoring.
2. Describe the concepts of Database activity monitoring.
3. Explain the use of database monitoring.
4. Briefly describe the key features of database monitoring.
5. Explain the two models of DAM architecture.
6. Quantify the user benefits of database monitoring.
7. Explain the concept of Privileged User Monitoring.
8. Discuss the various market factors driving the deployment of DAM tool.
Answers: Self Assessment
1. Auditing 2. database logging
3. Deployments 4. data governance
186 LOVELY PROFESSIONAL UNIVERSITY