O'Reilly logo
  • francis shey thinks this is interesting:

Understanding auditing

While the previous sections discussed proactive security measures, such as the granting of permissions and role-based security, there is also a time and a place for retroactive security measures. In the growing field of computer forensics, data collected during an attack becomes invaluable in determining the chain of events involved and learning the extent of the attack. In Oracle, the primary forensic tool available to us is auditing. Auditing is the act of recording a historical chain of events for various operations that take place in the database. Audi...