As the application of database becomes more and more popular, the security of thedata attracts more eyes on it. Data security is not a single problem but a systematicscheme. This paper introduces the technology of information and database security,depicts Audit, Logminer and Trigger of database, analyzes the advantages anddisadvantages of these three technologies used to monitor the operation to database.What's more, this paper brings forward a practical scheme according to the instance.Together with the technology of database security, redundant backup recovery andnetwork security, it makes an all-around security system. |