This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: switch or pulling the USB plug on a direct-attached external disk. Database storage security, the subject of this article, can be slightly more complicated than that. I talked recently with Ted Julian, vice president of consultancy Application Security, about the often-thorny security issues surrounding structured content in databases. Julian drew up a detailed look, in several steps, at what he sees as important in database security, starting with data discovery and moving all the way through how to implement intrusion detection. The Starting Point: Data Discovery First of all, you need to know exactly what you are securing. Rate...
View Full Document
- Spring '08