Auditing is enabled but only events being audited

Assignment Help Basic Computer Science
Reference no: EM133218190

Computer Science

As a result of testing the Oracle databases, it was discovered that there were a few issues that needed to be addressed. These are:

1. Auditing is enabled but the only events being audited are failed logins. For compliance purposes, both successful and failed logins need to be audited. Additionally, other events such as tablespace and column auditing need to be enabled to log activities associated with Personally Identifiable Information (PII) and Cardholder Information (CHI). This may necessitate the use of fine-grained auditing (FGA).

2. Encryption is not being used widely enough. Some tables are encrypted, but there are some tables that are not.

3. Monitoring of logs is not occurring. A monitoring solution needs to be identified to be compliant. This solution should make use of the existing Splunk implementation so you may need to present an overview of how that would work

Your task is to create the report for senior management, either in Google Docs, listing each of the three findings. In addition, you must document the risk posed by each one, the severity, and recommendations for addressing them. Be sure to provide justification for the severity rating. You will also need to provide details for the Oracle admins so they know what they need to do.

Reference no: EM133218190

Questions Cloud

Time of dramatic change in the world : The Romantic era was a time of dramatic change in the world. What "revolutionary" influences do you recognize in the art, literature, and music of the 19th cent
Outline the architecture of the mosque : Outline the architecture of the mosque. Why is the orientation of the qibla so important? How does the architecture of the mosque also emphasize the equality of
What is the bass line called : 1. What is the bass line called when it is played on all 4 beats of the measure?
How might the most valued aesthetics in freestyles : How might the most valued aesthetics in freestyles differ from the required aesthetics of these studio rhymes? Fitzgerald acknowledges the modern day freestyle
Auditing is enabled but only events being audited : Auditing is enabled but the only events being audited are failed logins. For compliance purposes, both successful and failed logins need to be audited.
Bluebirds over the mountain : Write a brief but thoughtful and critical review of the song "Bluebirds Over The Mountain".
Discuss the major differences in the creative control : The Beatles and Beach Boys had very different creative approaches; discuss the major differences in the creative control and output of these two groups making r
Explain in detail how alpha testing works : Explain in detail how alpha testing works. Elaborate on any five advantages of alpha testing.
Dance videos in kindergarten through eighth grade : Go to videos and search for dance videos in Kindergarten through eighth grade. Select one of the videos to view and write about in the discussion post.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define boundaries of the system

Define Boundaries of the System. Determine performance expectations. Describe who should be on the systems analysis team

  Restaurant management database project

Draw an ER diagram for this database. Make sure to indicate primary keys, cardinality

  How can build 32bits shift left logical or shift right

how can i build 32bits shift left logical or shift right arithmetic with logisim?

  What is a rogue base station

1. In an analog cellular structure, what is needed to establish valid authentication? 2. What is a rogue base station? 3. What is snarfing and how does it work?

  What type of money would you say the rai stones are

1) What type of money would you say the Rai stones are? Are they commodity money? Are they fiat currency? Why or why not?

  Easy on ISO Database Security Framework

Easy on "ISO Database Security Framework" and need at least 10 slides of power point presentation with 5 source annotated bibliography.

  Does your company use both lan and wan technologies

Could any of the technologies (Ethernet, token ring, fast Ethernet, 100VG-AnyLAN or gigabit Ethernet) improve your current network's performance?

  Designers install software into the kernel

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)?

  Study to improving the acceptance of new technology

Simon and Paper (2007) explore the topic of user acceptance to new technologies; in this case voice recognition technology. Reviewing the general constructs of the TAM model the author's analyze, discuss the application of this model and the resul..

  Organizations do to protect their environments

What else should organizations do to protect their environments?

  Principles of digital integrity within system

A foundational knowledge of the three tiers of cybersecurity provides an understanding of hashing and the basic principles of digital integrity within a system.

  Addresses of clients through a web-based form

A novice developer writes a code to collect the email addresses of clients through a web-based form. Identify typical bottleneck associated

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd