O'Reilly logo

Understanding DB2® 9 Security: DB2® Information Management Software by Yuk-Kuen Henry Chan, Carmen Ka Man Wong, Kevin Yeung-Kuen See, Rebecca Bond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Database Auditing and Intrusion Detection

In some ways, DB2 database auditing is like putting a security camera in a convenience store. The fact that the camera is there will deter some crooks. If the crooks are brazen enough to proceed anyway, the video, when reviewed, will lead to their capture.

First Words

Setting up database auditing has some similarity to the plot of numerous detective shows on TV. The TV detectives realize that not every event is important enough to deserve attention (otherwise the show would exceed its allotted time), but the events that are important will lead to the culprit. That is one of the benefits of database auditing (and auditing in general); it can capture information that is deemed important enough ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required