2019
DOI: 10.11113/ijic.v9n1.206
|View full text |Cite
|
Sign up to set email alerts
|

A Conceptual Framework of Information Security Database Audit and Assessment

Abstract: Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…As a matter of fact, risk can be defined as effect of uncertainty on objectives [24,25], and there are many other definitions by several international organizations and standards which can describe and manage the phenomena, for example ISO/IEC 27005 [26], ISO Guide 73:2009 [27], COSO [28] or NIST SP 800-30 [29].…”
Section: Information Security Elements In Service Sciencementioning
confidence: 99%
“…As a matter of fact, risk can be defined as effect of uncertainty on objectives [24,25], and there are many other definitions by several international organizations and standards which can describe and manage the phenomena, for example ISO/IEC 27005 [26], ISO Guide 73:2009 [27], COSO [28] or NIST SP 800-30 [29].…”
Section: Information Security Elements In Service Sciencementioning
confidence: 99%
“…ConclusionesLa propuesta del modelo para implementar una auditoría a nivel de base de datos en Oracle para la trazabilidad de operaciones, viene asociado al de que debemos cautelar y proteger la información en las organizaciones, más aún como elemento importante de la protección de datos personales asociado a los elementos de confidencialidad, integridad y disponibilidad los cuales tiene que ir alineados a disposiciones legales. Por lo que los elementos de seguridad que se implemente tendrá un efecto directo en la calidad de la auditoría de seguridad[11].En el desarrollo del presente artículo, se ha mostrado de forma intrínseca ciertas amenazas causadas por una configuración predeterminada y si no se adoptan medidas de seguridad para este activo de información, quedará expuesta a elementos internos y externos que pueden causar perjuicio a la organización. El impacto en los datos almacenados lleva consigo el detenimiento de los servicios que se ofrecen, causando daños cuantiosos principalmente en lo económico y de reputación[12].…”
unclassified