Font Size: a A A

Research And Application Of Security Audit Technology For Measuring System Database

Posted on:2010-07-01Degree:MasterType:Thesis
Country:ChinaCandidate:H LiFull Text:PDF
GTID:2178360275450032Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
With rapid development of the network technology and popularization of Internet, database has already been developed and applied since its innovation. Up to now, database has penetrated through all fields, however, the problem of its security emerged as a major issue, and the previous security technology can't accommodate to new situation.The database security is very important. Database security is to protect and prevent database from being transpired, altered or damaged by unauthorized access. With computer technology's rapid development, people are focusing on database security increasingly. And none of security system is perfect, some people who deliberate to steal, damage data, will manage to break security control. And the database is confronted with the threat of damage from internal staff and illegal invasion from external damage. So, how to protect database system from damage is very challenging. And it is necessary to protect database system by audit mechanism. All the operations can be logged automatically on audit log by audit mechanism in order to investigate and trace the cause. Therefore, security audit is an organic part of database security.This paper presents the background and significance of the subject research, database security research status, several database security mechanisms and database security audit principle. And it will do some research on the model of security audit, and analyze the detailed audit flow and audit methods. Furthermore, the paper will study the auditing technology of Oracle 9i, and provide a database audit system using Oracle 9i as the platform. The system also provides the functions of security guarantee and monitoring management. It can record every tiny change on the database. It can also provide the users perfect functions such as real-time information, audit clue tracing, log management and inquiry. Comparing with the traditional method, it is more administrable to analyze data, integrate and manage data.This paper illuminates the characteristics of database security audit and Oracle 9i audit, and focuses on the design and implementation of the whole auditing system. Finally, the paper summarizes the subject which still needs to be improved and gives its long-term outlook.
Keywords/Search Tags:Database security, security audit, Oracle audit
PDF Full Text Request
Related items