Tag Archives: database

Effective database activity monitoring (Page 1 of 2)

There are a number of reasons for organisations to deploy Database Activity Monitoring or DAM solutions, which can range anywhere from compliance to cover overall security.

DAM is a data centre technology, which monitors how the data that is stored in core databases and file servers is being accessed; it works on analyzing access behaviour to detect data breaches, if any; and takes action accordingly to mitigate them.

Various rules and regulations, compliance laws, etc also are increasingly forcing organisations to tighten their control over sensitive data they store, and have a verifiable audit trail that can be signed off, if required, by the appropriate organisational executives.

Database Activity Monitoring Architecture

Different DAM vendors have different ways of tracking activities in a database and therefore implementation of architecture is also slightly different.

A DAM with single appliance or single server architecture provides 1-to-1 mapping of a database server with a monitoring appliance; thus it acts both as a sensor and a collector of appropriate data. DAM with this configuration is good for a small database; however, for larger databases it might not be enough effective. Then there is DAM with 2-tier architecture, consisting of a centralised management server; this server collects information from a set of remote sensors or collection points. With this architecture there is a better degree of system scalability.

DAM with hierarchical architecture builds further onto the 2-tier architecture; this system is best suited for larger organizations; these DAMs are capable of supporting a larger number of sensors and collectors, distributed across a large enterprise.

Advanced Database Activity Monitoring Techniques

The process through which all SQL traffic to a database is monitored is called Network monitoring. Network monitoring allows monitoring multiple databases simultaneously; all the commands that are sent across to databases under scrutiny, are kept track of. The activities of users that are logged directly into the server via a local console are not recorded. Performance of a database is not affected by network monitoring, as no overhead is placed over the database directly.

In remote monitoring, a SQL collector is placed on the database with administrative privileges; the native database auditing is also enabled. The collector aggregates all activity collected by the auditing tools. This type of monitoring imposes an overhead on the database as logging is enabled on the database server, causing it to work more. The advantage of remote monitoring is that all database activities are collected, including that of a user who is logged directly into the server.

One can install local agents on each database that is being monitored, but it is not necessary that they would be successful in detecting all database activity; it would depend on how these agents have been configured, and how much closer to the database they are allowed to sit.

Guarding Against a Network Breach with Security Testing

As people spend more time shopping on the Internet and less time shopping in stores with cash, it is vitally important for a company’s data to be well-protected from hackers, data thieves and even security breaches from within. There are two ways to find out if a company’s computer network or data server are safe and sound from sabotage. One is to wait and see if it is hacked and compromised. The other is to do security penetration testing and fix any problems before they occur. The second option is a better business practice and, in the long run, less expensive.

Reputation Consumers do not want to do business with a company that will not protect their personal data, such as credit cards, names, telephone numbers and addresses. Even if the data is only used for an e-mail distribution list, customers will hesitate to trust the company in the future. If sensitive data is used to make credit card purchases or compromise the bank accounts of customers and contacts, it won’t take long for them to find out. When they do, the business owner can be sure that everyone the person knows – and the press – will probably hear about it, too. Keep in mind that not only will consumers avoid a company that cannot keep information safe, they will not want to make any types of purchases or use its website – even after it has been fixed.

Financial Ruin Capturing information from a company’s database for e-commerce or even day-to-day operations can force them out of business. Compromising a company’s server can not only cause problems with data, the company’s bank accounts and online e-commerce user names and passwords can be captured as well. This means that funds can be spent without the company’s knowledge until a red flag is raised. For those with loosely structured accounting departments, this is detrimental to a company’s financial health.

Solution By hiring a reputable application testing or penetration testing specialist, a business owner or manager can find out whether their applications, database and computer information can be easily hacked. Referred to in the industry as ethical hacking, a series of popular hacking techniques are tested on the website, network or database to see whether the target can be breached. After the test results have been obtained, expert consultation is done to limit the possibility of breaches or future episodes.

Time Frame The process of hacking into a company’s database or website may take only a matter of seconds, minutes or days for the malicious competitor or money-hungry thief.. Cleaning up the mess left behind could take the business weeks, months or years. Some companies never recover. Penetration testing by a reputable and thorough penetration testing contractor usually takes one to two weeks. Rather than rush through the process in two to three days, the specialist uses a number of methods and attempts a number of entries before stating whether a business’ system is adequately protected. Most vulnerabilities can be fixed within a week.

Guarding Against a Network Breach with Security Testing

As people spend more time shopping on the Internet and less time shopping in stores with cash, it is vitally important for a company’s data to be well-protected from hackers, data thieves and even security breaches from within. There are two ways to find out if a company’s computer network or data server are safe and sound from sabotage. One is to wait and see if it is hacked and compromised. The other is to do security penetration testing and fix any problems before they occur. The second option is a better business practice and, in the long run, less expensive.

Reputation Consumers do not want to do business with a company that will not protect their personal data, such as credit cards, names, telephone numbers and addresses. Even if the data is only used for an e-mail distribution list, customers will hesitate to trust the company in the future. If sensitive data is used to make credit card purchases or compromise the bank accounts of customers and contacts, it won’t take long for them to find out. When they do, the business owner can be sure that everyone the person knows – and the press – will probably hear about it, too. Keep in mind that not only will consumers avoid a company that cannot keep information safe, they will not want to make any types of purchases or use its website – even after it has been fixed.

Financial Ruin Capturing information from a company’s database for e-commerce or even day-to-day operations can force them out of business. Compromising a company’s server can not only cause problems with data, the company’s bank accounts and online e-commerce user names and passwords can be captured as well. This means that funds can be spent without the company’s knowledge until a red flag is raised. For those with loosely structured accounting departments, this is detrimental to a company’s financial health.

Solution By hiring a reputable application testing or penetration testing specialist, a business owner or manager can find out whether their applications, database and computer information can be easily hacked. Referred to in the industry as ethical hacking, a series of popular hacking techniques are tested on the website, network or database to see whether the target can be breached. After the test results have been obtained, expert consultation is done to limit the possibility of breaches or future episodes.

Time Frame The process of hacking into a company’s database or website may take only a matter of seconds, minutes or days for the malicious competitor or money-hungry thief.. Cleaning up the mess left behind could take the business weeks, months or years. Some companies never recover. Penetration testing by a reputable and thorough penetration testing contractor usually takes one to two weeks. Rather than rush through the process in two to three days, the specialist uses a number of methods and attempts a number of entries before stating whether a business’ system is adequately protected. Most vulnerabilities can be fixed within a week.