Carving database storage to detect and trace security breaches

نویسندگان
چکیده

منابع مشابه

Carving database storage to detect and trace security breaches

Database Management Systems (DBMS) are routinely used to store and process sensitive enterprise data. However, it is not possible to secure data by relying on the access control and security mechanisms (e.g., audit logs) of such systems alone e users may abuse their privileges (no matter whether granted or gained illegally) or circumvent security mechanisms to maliciously alter and access data....

متن کامل

Sanction guidelines for privacy and security breaches.

For privacy and security professionals following the news, the incidents reveal a wide span of provider philosophy and response regarding breaches. Facilities demonstrate varied degrees of access control management, differing stringency of enforcement policy, and inconsistent application of employee sanctions. Sanctions have ranged from gentle reminders to unspecified disciplinary action to ter...

متن کامل

Intrusion-Detection Policies for IT Security Breaches

I systems (IDSs) form an important component of IT security architectures, but the low proportion of hackers in the user population severely limits the usefulness of IDSs. Thus, even when the IDS is good, an intrusion signal may not imply that the user is more likely to be a hacker than a normal user. Ignoring the low base rate for the proportion of hackers results in acting on every intrusion ...

متن کامل

A Sophistication Index for Evaluating Security Breaches

The focus of this research is to develop a sophistication index for evaluating security breaches due to cyber-attacks. Although reports about cyber-attacks elucidate the sophistication involved in a given security or data breach, it is difficult to compare the sophistication of breaches across multiple attacks. Once we have an attack sophistication index, incidents can be compared and consequen...

متن کامل

Users' perceptions about mobile security breaches

Apart from the technological perspective of security in mobile devices and applications, the economic perspective has been increasingly attracting the academic and business interest. This paper aims to investigate the perceptions of mobile users about the economic importance of security breaches. Instead of considering mobile users as a whole, they were examined as distinct user types based on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Investigation

سال: 2017

ISSN: 1742-2876

DOI: 10.1016/j.diin.2017.06.006