.

Thursday, March 28, 2019

The Deployment of Security Policy in Information Systems Essay

Database auditing is considered as a contemporary article on database collectable to a vital role on the database security (Abraham, etal .,2002).There be umteen different of motivations that make one very excited to do this work , Nevertheless there are millions of database transactions that being kill among different of hosts all-round the organization sites. There are many dubiousness arise such as How to do some statistical analysis on database, also How to reveal out the crimes that the database is vulnerable to. Surrounding the serviceman that fully of millions of end users part of this huge figure doing poisonous activities that may create crises and Misleading ,thus, firms depend on the randomness that being manipulated on the database and as it has been noticed the information is strategic material on organization.With the many of database crimes it is very difficult to determine the person that is responsible of some malicious activities in the database, th erefore, database auditing implementation is generated to stand behind this issues wherever a crimes appears on an organization.On other hand the database auditing implementation assist on the judgement of our organizations behaviors, attitudes, and rationality in dealing with organizational database. in spite of appearance the technological competence awareness is important, different security solutions have been presented and the take up solution is to audit the database logs, actions on database and any alteration on the objects of database to subdue any data modification. Through revolution of information technology (rapid, grand technology) Database auditing implementation should afford the velocity and power full to monitor the database activities. Moreover, we are in a bottle n... ...erience in analysis and design of distributed information systems, I+D Computation, Vol.1, No.1, July 2002. 8 H.G. Sol, R.L. Crosslin, Dynamic modelling of information systems II, North Holl and, Amsterdam,1992. 9 P.I Rivera-Vega, R. Karlapalem, M. Ra, A mixed fragmentation approach for inintial distributed database design, Proceedings of International conference on data engineering, IEEE, 1990. 10 K. Hui, Knowledge Fusion and Constraint Solving in a Distributed Environment, PhD Thesis, University of Aberdeen, Kings College, Aberdeen, 2000. 11 R. Varadarajan, P.I. Rivera-Vega, S.B. Navathe, Data redistribution scheduling in fully connected networks, Proceedings of twenty-seventh Annual Alberton conference on communication, Control and Computing, 1989.12 M.T. zsu, P. Valduriez, Principles of distributed database systems, Prentice Hall Edt, impudent Jersey, 1999.

No comments:

Post a Comment