+

ATTENTION! If You're from the US and You'd like to buy a subscribtion please contact us directly at email: joanna.kretowicz@eforensicsmag.com

A Database Administrator’s Guide to Security

August 29, 2013


Database Magazine admin Comments Off
This text is available for purchase but you need to login or register first.

You can buy this for 20 USD

Please register for free account or subscribe and get access to all issues on this website!
You can buy full version this issue or buy subscription and get access to all issues on our website
[Click here to see text]: CREATE FREE ACCOUNT
[Click here to see text]: SUBSCRIBE (221,40 USD/YEAR)
[Click here to see text]: LOG IN

eForensics_11_2013-1Dear eForensics readers!

We are happy to present you our special issue about Database Security.

Check out the table of contents:

​​​FORENSICS COLLECTIONS TO E-DISCOVERY USING TODAY’S TECHNOLOGY TO BRIDGE THE GAP

by Rick Clark

Since the amended United States Federal Rules of Civil Procedure have taken effect in 2006 to incorporate electronically stored information as discoverable, technology in the legal space involves an interesting mix of forensics, e-discovery and review. There are now software companies that have done a great job in bridging the gap from forensic collections to data analysis and data/document review. Forensic departments are now able to offer a full suite of offerings that take the forensic image and present the data in a way that allows investigators to leverage analytics and find the most relevant data quickly.

 

​​ ​DATABASE FORENSICS – SETTING THE NEW STANDARD OF CYBER INVESTIGATIONS

by Kevvie Fowler

During a forensic investigation, an investigator tracks a hacker’s actions on a system until “it” happens; the investigator identifies that the hacker has accessed a critical database. The investigator then reviews system and database logs which do not yield any useful information. And now the investigator is left wondering – was any sensitive database data viewed? Was anything modified?

 

​​ ​ADDRESSING THE BIG DATA SECURITY

by Sushil Pramanick

Data Security rules have changed in the age of Big Data. The V-Force (Volume, Veracity and Variety) has changed the landscape for data processing and storage in many organizations. Organizations are collecting, analyzing, and making decisions based on analysis of massive amounts of data sets from various sources: web logs, click stream data and social media content to gain better insights about their customers. Their business and security in this process is becoming increasingly more important. IBM estimates that 90 percent of the data that now exists have been created in the past two years.

 

​​ ​DATABASING – A PROJECT MANAGERS BEST FRIEND

by Rick Fort

Tracking the details of projects has turned into a full time job. Electronic document management vendors have struggled in finding qualified staff to handing the many projects they must manage during the course of business. Having the right tools in hand can make the difference of having successful quality projects or a disastrous reputation throughout the industry.

 

​​ ​INTRODUCTION TO ORACLE DATABASE SECURITY

by Jay Munshi

The usual stereotypes would imagine a 16 year old wiz sitting in a small dark corner of his parents basement cracking into Commercial systems just for the fun of it or wants to take the easy way to becoming a millionaire. That is the very stereotype that is least likely of the dangers databases face.

 

​​ ​MAC OSX LION LIVE RAM ACQUISITION AND ANALYSIS GIVES YOU TONS OF ARTIFACTS

by Mr. Nilay Mistry, Dr. M. S. Dahiya, Dr. J. M. Vyas

Today new technology came into existence in few minutes, so to cop up with its security implications, knowledge of analysis is needed. All systems come up with its own memory, e.g. RAM, NAND Flash etc. They contain lots of potential evidences. Here in this article some of the artifacts are identified and discussed how to get it from live forensic analysis. That is a part of memory investigation, and that covers live analysis of memory-based artifacts in Unix OS. This scenario is simulated in MAC OSX 10.7.4 with the help of some open source forensic tools.

 

​​ ​AUDITING LOGIN RELATED EVENTS IN SQL SERVER

by David Zahner

In this article I will be exploring different methods of tracking and storing the login events that take place on your SQL Server as well as some ideas as to what to do with the information once gathered. With the exception of the extended events example which will only work with SQL Server 2008 and above, the other methods outlined will work with all versions and editions from SQL Server 2005 and beyond.


​​
KEYNOTE SPEAKER PAUL SALAZAR OF SIEMENS AG BRINGS INTERNATIONAL LITIGATION EXPERIENCE TO LAWTECH EUROPE CONGRESS 2013

by Paul Salazar

LawTech Europe Congress, the largest and most significant electronic evidence, forensic investigations, cyber security, and legal technology conference to be brought to Central and Eastern Europe announces Paul Salazar as Keynote Speaker for its 2013 event.

 

​​ ​SECRETS TO ENHANCING DATA SECURITY WITH IN-MEMORY COMPUTING PERFORMANCE

by Altibase

Data security is more critical than ever before. With every passing moment, the threats grow geometrically. The world is plagued by hackers, cyber terror, viruses and related dangers. A pervasive problem stems from a systemic inability to couple a high-level of preventative security (encryption/decryption) with extreme diagnostic detection speed. Worse yet, if abnormal data activity is not detected in real-time, the malicious activity remains unnoticed and the perpetrators are long gone. Data encryption alone is not enough. Encryption that is fortified by real-time “abnormal activity” detection capabilities is the only solution.


​​
THE SAD PRINCIPLE: A BEGINNER’S GUIDE TO DATABASE SECURITY

by Lucio Pitocco

As a database administrator, you will always deal with the SAD principle, of someone willing to Steal, Alter or Damage data he/she does not have access to. You cannot avoid those issues at all: you can only minimize the risk, and have some info ready to investigate and eventually recover them afterwards.

 

​​ ​CAUSAL INFERENCE ENGINE: THE MISSING LINK IN BIG DATA ANALYTICS. AN INTERVIEW WITH DECISION-ZONE CEO RAJEEV BHARGAVA

by Larry Karisny

The Smart Grid is beginning to open our eyes to a few things we were not aware of when adding intelligence to these massive critical infrastructures. As we add intelligence we are adding big data and we have to find ways to quickly, accurately and security move this data while analyzing its input.  Current analytic approaches are already becoming bogged down with the costs and even the inability to decipher what all this data means.  Just moving this much data is also adding security risks to the control systems operating the grid infrastructure.

 

This text is available for purchase but you need to login or register first.

You can buy this for 20 USD

Please register for free account or subscribe and get access to all issues on this website!
Database Administrator Guide to Security teaserDatabase Administrator Guide to Security teaser – Teaser
Database Administrator Guide to Security teaser

Follow the steps below to download the magazine:
  1. Register, accept the Disclaimer and choose subscription option.
    Attention!
    By choosing the Free Account option you will only be able to download the teaser of each issue.
  2. Verify your account using the verification link sent to your email address.
  3. Check the password sent on your email address and use it to log in.
  4. Click the download button to get the issue.


IMPORTANT: the registration on the website includes subscription to our newsletter.

You can buy full version this issue or buy subscription and get access to all issues on our website

[Click here to see text]: CREATE FREE ACCOUNT
[Click here to see text]: SUBSCRIBE (221,40 USD/YEAR)
[Click here to see text]: LOG IN

Comments

Tagged with:

Comments are closed.


IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa