Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Risk-Based Approach to Auditing Relational Databases

A Risk-Based Approach to Auditing Relational Databases
View Free PDF
Author(s): Wendy S. Walker (Miami University, USA) and Jeffrey W. Merhout (Miami University, USA)
Copyright: 2006
Pages: 2
Source title: Emerging Trends and Challenges in Information Technology Management
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-019-6.ch263
ISBN13: 9781616921286
EISBN13: 9781466665361


With the increased focus on risks and controls since the passing of the Sarbanes-Oxley Act in the U.S., security has been an increasingly hot topic among IT professionals. As a result, risk assessment has become an important measure for designing controls. Assessing the risks associated with relational database design could result in various controls being proactively implemented to help prevent security breaches. Some controls available to prevent security violations include: access and authorization controls, specifically discretionary and mandatory access control; encryption, including full database and partial database encryption; and monitoring controls.

Body Bottom