Font Size: a A A

Security Audit Research On Data Center Data

Posted on:2012-04-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y L JiaFull Text:PDF
GTID:2178330338455016Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Data Center is the information management platform for oil field production and service data, which stores all kinds of data producing by every oil plant and implements information sharing. One of the research areas on constructing the data center is the security. In the view of the database application, the security of the outer environment for the database has been paid more concern than the inner. The inner construction means the auditing operation for the database, such as the adding, deleting, modifying, searching and other operating. But these operating conceal many threatens. It is possible that a careless operation may be result in the breakdown of the whole database. There is no way to find out the user. For the reason, it is necessary to audit and monitor the database. By analyzing the operation records, the auditors can find and clean out these threatens.Because of the auditing for the database does not perform well, which just simplies play the data recording. In fact, the auditing is conducted manually. For the large amount and the imperfection of the data, it is hard to audit timely and efficiently. By analyzing imperfections of auditing and generating a new generation of database with enhanced functions and developed programs, aimed to resolve these flaws and delivery integrated information for the database. And it intends to establish the auditing rules based on the metadata theory. Those threat will be found and handed over to the auditors by integrating the complex auditing data and auditing rules while judging by auditing laws. In this way, it can release the workload of the auditors and cope with those threats effectively. At the meantime, the security of the database can be guaranteed, as well as the database center.
Keywords/Search Tags:the security of the database, the security of auditing, the rules of auditing, oracle
PDF Full Text Request
Related items