Feeds

Detecting mischievous activity

Authorised fraud

Intelligent flash storage arrays

Comment Computing magazine recently ran a major feature on security. In particular, it focused on internal as opposed to external threats, reflecting the fact that, according to the (former) National Hi-Tech Crime Unit, some 38 per cent of financial fraud in the UK is a result of internal security breaches.

The article(s) then went on to look at the prevention of unauthorised access to data. However, any casual reading of fraud reports in the news media will quickly reveal that a significant proportion of fraud (not to mention sabotage by disgruntled employees) is committed by authorised rather than unauthorised personnel. And if someone is authorised to read, write or update data, then how do you prevent, or at least detect (at the earliest possible stage) any unauthorised activity?

The simple answer to this is that you have an audit trail and log files associated with your database that you can query as and when required. However, log files are really only useful for finding information when you already know what you are looking for: in other words after the event (that is, too late). More proactive facilities that monitor database activity, as provided by a number of database vendors, are much more useful, but the overhead incurred by these tools is such that they are almost invariably turned off for performance reasons.

In fact, the only practical way to monitor database activity in anything like real-time is to monitor database requests across the network. That is, before the data is committed to the database. This has the advantage that you also pick up illicit attempts to access the database as well as those that are legitimate. Further, you can implement filters against the monitored traffic to issue real-time alerts when suspicious activity is reported. In addition, as you are logging all the requests that are sent to the database, you can also use the same software for compliance reasons, to analyse data usage (for example, to support archival policies) and so on.

To give examples of the type of monitoring you might want to do, you might want to raise an alert if someone who normally accesses data between 9am and 5pm suddenly access the database at 2am. He might simply be a diligent employee, but you'd like to know. You might also like to know if a person who has access to user names and to passwords wants to look at them both at the same time. No doubt you can think of lots of other things that might be indicative of something naughty, but I'll leave that for you to work out.

Quite what this class of security/auditing solution should be called is debatable - database security has implications to do with encryption and access control - but regardless of what it is called, there are a few vendors offering relevant solutions though, surprisingly, the big boys such as Symantec do not have offerings in this area (as far as I know) and the event processing vendors such as Streambase, Progress and Aleri are not targeting this area either.

Of the suppliers that I have identified in this area, the leading one is Embarcadero, which acquired Ambeo last year. Unlike the other players it is well-established, has a global presence and a significant, existing customer base. Embarcadero's product, which is called DSAuditor, provides both auditing and monitoring (not all tools do) and it is currently a major focus for the company as it drives its business forward.

Copyright © 2006, IT-Analysis.com

Beginner's guide to SSL certificates

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
Hungary's internet tax cannot be allowed to set a precedent, says EC
More protests planned against giga-tariff for Tuesday evening
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.