index2.php - switch or pulling the USB plug on a...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Keys to Locking Down Storage Security on a Database By: Chris Preimesberger 2008-09-12 Article Rating: / 10 There are user comments on this Data Storage story. Enterprises most often keep their most valued data in structured storage inside a database of some kind, and hackers know it. Security consultant Ted Julian of Application Security offers a detailed look in several steps at how he believes database security should be implemented, starting with data discovery and moving all the way through the implementation of intrusion detection. Rate This Article: Poor Best E- mail Print PDF Version All storage, structured or unstructured, requires security of some kind, even if it's simply flipping an on/off
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: switch or pulling the USB plug on a direct-attached external disk. Database storage security, the subject of this article, can be slightly more complicated than that. I talked recently with Ted Julian, vice president of consultancy Application Security, about the often-thorny security issues surrounding structured content in databases. Julian drew up a detailed look, in several steps, at what he sees as important in database security, starting with data discovery and moving all the way through how to implement intrusion detection. The Starting Point: Data Discovery First of all, you need to know exactly what you are securing. Rate...
View Full Document

Page1 / 2

index2.php - switch or pulling the USB plug on a...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online