File Library


A Holistic Approach to Database Security
Topic: The Database
Owner: Robert Lockard
Date: 2013-06-24
Subtopic: At A Glance

Starting with a brief history of security breaches and the impact to both companies and consumers. I move through a methodology of identifying sensitive information creating a risk matrix and what tools are available to mitigate information leaks.
Subjects covered:
Attack Vector: how does your information leak. Including an open and frank discussion of organized gangs (ie Anonymous)
Risk mitigation.
Audit
Database Firewall
Database Vault
Audit Vault
Database encryption
Backup encryption
Network encryption


Download File   Holistic Database Security.pdf

Become a member of ODTUG to gain access to more than 12,500 files in our technical database.

  • Not a member? Click through to the topic of interest to browse a list of available presentations.
  • Already a member? Log-in here to access the full database


Click here to see the Full Techincal Resource Database