Change search
ReferencesLink to record
Permanent link

Direct link
Detection of suspicious database activity
2001 (English)Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Even if you have never touched a computer, I dare to say you’ve indirectly made contact with a database. If you pay a visit to your doctor or do shopping, information about your doings is stored in a database. Using a database is a common way to collect, store, manage and access data. This thesis will focus on the security domain regarding databases, applying particularly to detect suspicious activities. Today there is an abundance of systems, which duties are to prevent and detect attempts of intrusion. These products can be applied on network- or host based systems. Security regarding databases has emerged only recently. My task is to find out, which activities you should consider suspicious and design a model that will collaborate with Protegrity’s product, Secure.Data. In the following report, I will give you a brief account of security and intrusion, and then illuminate some important issues regarding my task.

Place, publisher, year, edition, pages
2001.
Keyword [en]
Technology, databases, suspect activities, intrusion detection, suspicious database activity detection, intruders, threats, data security
Keyword [sv]
Teknik
Identifiers
URN: urn:nbn:se:ltu:diva-52429ISRN: LTU-HIP-EX--01/48--SELocal ID: 98dc5b62-382d-448b-8313-46066a0ba13aOAI: oai:DiVA.org:ltu-52429DiVA: diva2:1025799
Subject / course
Student thesis, at least 15 credits
Educational program
Computer Engineering, bachelor's level
Examiners
Note
Validerat; 20101217 (root)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

No full text

Search outside of DiVA

GoogleGoogle Scholar

Total: 1 hits
ReferencesLink to record
Permanent link

Direct link