We are happy to present you our special issue about Database Security.
Check out the table of contents:
FORENSICS COLLECTIONS TO E-DISCOVERY USING TODAY’S TECHNOLOGY TO BRIDGE THE GAP
by Rick Clark
Since the amended United States Federal Rules of Civil Procedure have taken effect in 2006 to incorporate electronically stored information as discoverable, technology in the legal space involves an interesting mix of forensics, e-discovery and review. There are now software companies that have done a great job in bridging the gap from forensic collections to data analysis and data/document review. Forensic departments are now able to offer a full suite of offerings that take the forensic image and present the data in a way that allows investigators to leverage analytics and find the most relevant data quickly.
DATABASE FORENSICS – SETTING THE NEW STANDARD OF CYBER INVESTIGATIONS
by Kevvie Fowler
During a forensic investigation, an investigator tracks a hacker’s actions on a system until “it” happens; the investigator identifies that the hacker has accessed a critical database. The investigator then reviews system and database logs which do not yield any useful information. And now the investigator is left wondering – was any sensitive database data viewed? Was anything modified?
ADDRESSING THE BIG DATA SECURITY
by Sushil Pramanick
Data Security rules have changed in the age of Big Data. The V-Force (Volume, Veracity and Variety) has changed the landscape for data processing and storage in many organizations. Organizations are collecting, analyzing, and making decisions based on analysis of massive amounts of data sets from various sources: web logs, click stream data and social media content to gain better insights about their customers. Their business and security in this process is becoming increasingly more important. IBM estimates that 90 percent of the data that now exists have been created in the past two years.
DATABASING – A PROJECT MANAGERS BEST FRIEND
by Rick Fort
Tracking the details of projects has turned into a full time job. Electronic document management vendors have struggled in finding qualified staff to handing the many projects they must manage during the course of business. Having the right tools in hand can make the difference of having successful quality projects or a disastrous reputation throughout the industry.
INTRODUCTION TO ORACLE DATABASE SECURITY
by Jay Munshi
The usual stereotypes would imagine a 16 year old wiz sitting in a small dark corner of his parents basement cracking into Commercial systems just for the fun of it or wants to take the easy way to becoming a millionaire. That is the very stereotype that is least likely of the dangers databases face.
MAC OSX LION LIVE RAM ACQUISITION AND ANALYSIS GIVES YOU TONS OF ARTIFACTS
by Mr. Nilay Mistry, Dr. M. S. Dahiya, Dr. J. M. Vyas
Today new technology came into existence in few minutes, so to cop up with its security implications, knowledge of analysis is needed. All systems come up with its own memory, e.g. RAM, NAND Flash etc. They contain lots of potential evidences. Here in this article some of the artifacts are identified and discussed how to get it from live forensic analysis. That is a part of memory investigation, and that covers live analysis of memory-based artifacts in Unix OS. This scenario is simulated in MAC OSX 10.7.4 with the help of some open source forensic tools.
AUDITING LOGIN RELATED EVENTS IN SQL SERVER
by David Zahner
In this article I will be exploring different methods of tracking and storing the login events that take place on your SQL Server as well as some ideas as to what to do with the information once gathered. With the exception of the extended events example which will only work with SQL Server 2008 and above, the other methods outlined will work with all versions and editions from SQL Server 2005 and beyond.
KEYNOTE SPEAKER PAUL SALAZAR OF SIEMENS AG BRINGS INTERNATIONAL LITIGATION EXPERIENCE TO LAWTECH EUROPE CONGRESS 2013
by Paul Salazar
LawTech Europe Congress, the largest and most significant electronic evidence, forensic investigations, cyber security, and legal technology conference to be brought to Central and Eastern Europe announces Paul Salazar as Keynote Speaker for its 2013 event.
SECRETS TO ENHANCING DATA SECURITY WITH IN-MEMORY COMPUTING PERFORMANCE
Data security is more critical than ever before. With every passing moment, the threats grow geometrically. The world is plagued by hackers, cyber terror, viruses and related dangers. A pervasive problem stems from a systemic inability to couple a high-level of preventative security (encryption/decryption) with extreme diagnostic detection speed. Worse yet, if abnormal data activity is not detected in real-time, the malicious activity remains unnoticed and the perpetrators are long gone. Data encryption alone is not enough. Encryption that is fortified by real-time “abnormal activity” detection capabilities is the only solution.
THE SAD PRINCIPLE: A BEGINNER’S GUIDE TO DATABASE SECURITY
by Lucio Pitocco
As a database administrator, you will always deal with the SAD principle, of someone willing to Steal, Alter or Damage data he/she does not have access to. You cannot avoid those issues at all: you can only minimize the risk, and have some info ready to investigate and eventually recover them afterwards.
CAUSAL INFERENCE ENGINE: THE MISSING LINK IN BIG DATA ANALYTICS. AN INTERVIEW WITH DECISION-ZONE CEO RAJEEV BHARGAVA
by Larry Karisny
The Smart Grid is beginning to open our eyes to a few things we were not aware of when adding intelligence to these massive critical infrastructures. As we add intelligence we are adding big data and we have to find ways to quickly, accurately and security move this data while analyzing its input. Current analytic approaches are already becoming bogged down with the costs and even the inability to decipher what all this data means. Just moving this much data is also adding security risks to the control systems operating the grid infrastructure.
You can buy full version this issue or buy subscription and get access to all issues on our website
Comments are closed.