SECURITY INFORMATION IN PRODUCTION AND OPERATIONS: A STUDY ON AUDIT TRAILS IN DATABASE SYSTEMS

Authors

  • Rodrigo Roratto Federal University of Santa Maria
  • Evandro Dotto Dias Federal University of Santa Maria

DOI:

https://doi.org/10.4301/S1807-17752014000300010

Abstract

Special care should be taken to verify the integrity and to ensure that sensitive data is adequately protected. One of the key activities for data loss prevention is anaudit. And in order to be able to audit a system, it is important to have reliable records of its activities. Systems that store critical data, whether financial or productive, must have features such as audit log, also called audit trail, which records all activities on critical data. This allows to identify harmful actions that can be internal or external, intentionally or unintentionally caused. Therefore, this paper presents major studies in security audit trail (audit log), especially records of logs, and it presents what is available in terms of commercial tools and what they offer.

Downloads

Download data is not yet available.

Published

2014-12-01

Issue

Section

Articles

How to Cite

SECURITY INFORMATION IN PRODUCTION AND OPERATIONS: A STUDY ON AUDIT TRAILS IN DATABASE SYSTEMS . (2014). Journal of Information Systems and Technology Management, 11(3), 717-734. https://doi.org/10.4301/S1807-17752014000300010