8 Simple Steps to Protect Your Database - #4. Know How Users Use the Database

 
 
By Brian Prince  |  Posted 2008-03-19 Print this article Print
 
 
 
 
 
 
 
 
Previous
Slide 5

One of the best defenses against outside attacks and internal fraud is the detection of anomalous activity. Implement database-monitoring tools that distinguish normal and abnormal activities for each user, and that can immediately respond to abnormal activities.


Next
 

Just how do you protect your database? Here are eight tips to consider when you are looking to lock down the structured data in your enterprise.

 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
Rocket Fuel