Page 192 - DCAP508_DATABASE_ADMINISTRATION
P. 192

Database Administration




                    Notes              Privileged users monitoring – DBAs, root, system admins – which have access to access
                                       and alter data either via the application either by logging in at the system OS or local
                                       console.
                                       The preventive security solutions and controls such as encryption and access management,
                                       are not effective for authorized/legitimate user access.

                                       Database Firewall includes a complete set of predefined, customizable security and audit
                                       policies

                                   13.8 Keywords

                                   Application Activity Monitoring: The primary purpose of application activity monitoring is to
                                   provide a greater level of end-user accountability and detect fraud (and other abuses of legitimate
                                   access) that occurs via enterprise applications, rather than via direct access to the database.
                                   Database activity monitoring: Database activity monitoring (DAM) / Database Firewall (DBF)
                                   monitors database activity to identify fraudulent, illegal or other undesirable behavior, by
                                   using  embedded knowledge about database structures and access to analytics and reporting
                                   and enforce policies and control.
                                   Database Firewall: A tool that includes a complete set of predefined, customizable security and
                                   audit policies.
                                   Privileged user Monitoring: This includes auditing all activities and transactions; identifying
                                   anomalous activities (such as viewing sensitive data, or creating new accounts with superuser
                                   privileges); and reconciling observed activities (such as adding or deleting tables) with authorized
                                   change requests.
                                   SQL injection: It is a type of attack used to exploit bad coding practices in applications that use
                                   relational databases.

                                   User Activity Monitoring: in order to track the users and the applications that connect to the
                                   database.

                                   13.9 Review Questions

                                   1.  Discuss the need of database monitoring.

                                   2.  Describe the concepts of Database activity monitoring.
                                   3.  Explain the use of database monitoring.
                                   4.  Briefly describe the key features of database monitoring.

                                   5.  Explain the two models of DAM architecture.
                                   6.  Quantify the user benefits of database monitoring.
                                   7.  Explain the concept of Privileged User Monitoring.
                                   8.  Discuss the various market factors driving the deployment of DAM tool.

                                   Answers: Self Assessment

                                   1.  Auditing                          2.   database logging

                                   3.  Deployments                       4.   data governance





          186                               LOVELY PROFESSIONAL UNIVERSITY
   187   188   189   190   191   192   193   194   195   196   197