Getting Started on Database Security
A security manager tells her tale of tackling database security. At her organization, she says much attention has been given to auditing firewall rules, turning off unneeded services on servers and patching operating systems, internetwork operating systems and various applications, but it seems that...
Gespeichert in:
Veröffentlicht in: | Computerworld 2005-07, Vol.39 (30), p.32 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A security manager tells her tale of tackling database security. At her organization, she says much attention has been given to auditing firewall rules, turning off unneeded services on servers and patching operating systems, internetwork operating systems and various applications, but it seems that not much attention has been given to database security and auditing. Now her agency is developing a major new application using DB2, and she needs to come up with security requirements. It so happens that Elsevier Digital Press recently sent her the book Implementing Database Security and Auditing, by Ron Ben Natan. The book provides a to-do list that the security manager feels will give her a good start at securing her databases. |
---|---|
ISSN: | 0010-4841 |