Scientific Research An Academic Publisher
OPEN ACCESS
Add your e-mail address to receive free newsletters from SCIRP.
Select Journal AA AAD AAR AASoci AAST ABB ABC ABCR ACES ACS ACT AD ADR AE AER AHS AID AiM AIT AJAC AJC AJCC AJCM AJIBM AJMB AJOR AJPS ALAMT ALC ALS AM AMI AMPC ANP APD APE APM ARS ARSci AS ASM BLR CC CE CellBio ChnStd CM CMB CN CRCM CS CSTA CUS CWEEE Detection EMAE ENG EPE ETSN FMAR FNS GEP GIS GM Graphene GSC Health IB ICA IIM IJAA IJAMSC IJCCE IJCM IJCNS IJG IJIDS IJIS IJMNTA IJMPCERO IJNM IJOC IJOHNS InfraMatics JACEN JAMP JASMI JBBS JBCPR JBiSE JBM JBNB JBPC JCC JCDSA JCPT JCT JDAIP JDM JEAS JECTC JEMAA JEP JFCMV JFRM JGIS JHEPGC JHRSS JIBTVA JILSA JIS JMF JMGBND JMMCE JMP JPEE JQIS JSBS JSEA JSEMAT JSIP JSS JSSM JST JTR JTST JTTs JWARP LCE MC ME MI MME MNSMS MPS MR MRC MRI MSA MSCE NJGC NM NR NS OALib OALibJ ODEM OJA OJAB OJAcct OJAnes OJAP OJApo OJAppS OJAPr OJAS OJBD OJBIPHY OJBM OJC OJCB OJCD OJCE OJCM OJD OJDer OJDM OJE OJEE OJEM OJEMD OJEpi OJER OJF OJFD OJG OJGas OJGen OJI OJIC OJIM OJINM OJL OJM OJMC OJMetal OJMH OJMI OJMIP OJML OJMM OJMN OJMP OJMS OJMSi OJN OJNeph OJO OJOG OJOGas OJOp OJOph OJOPM OJOTS OJPathology OJPC OJPChem OJPed OJPM OJPP OJPS OJPsych OJRA OJRad OJRD OJRM OJS OJSS OJSST OJST OJSTA OJTR OJTS OJU OJVM OPJ POS PP PST PSYCH SAR SCD SGRE SM SN SNL Soft SS TEL TI UOAJ VP WET WJA WJCD WJCMP WJCS WJET WJM WJNS WJNSE WJNST WJV WSN YM
More>>
D. Litchfield, “Oracle Forensics Part 2: Locating Dropped Objects,” NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd., Sutton, 2007.
has been cited by the following article:
TITLE: Digital Evidence for Database Tamper Detection
AUTHORS: Shweta Tripathi, Bandu Baburao Meshram
KEYWORDS: Tamper Detection; Log Files; Forensics; Oracle Database
JOURNAL NAME: Journal of Information Security, Vol.3 No.2, April 26, 2012
ABSTRACT: Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing with the basic steps of forensic analysis the paper elaborates the extraction of suspicious locations in oracle. As a forensic examiner, collecting digital evidence in a database is a key factor. Planned and a modelled way of examination will lead to a valid detection. Based on the literature survey conducted on different aspects of collecting digital evidence for database tamper detection, the paper proposes a block diagram which may guide a database forensic examiner to obtain the evidences.
Related Articles:
Information Availability: An Insight into the Most Important Attribute of Information Security
Suhail Qadir, S. M. K. Quadri
DOI: 10.4236/jis.2016.73014 4,971 Downloads 9,138 Views Citations
Pub. Date: April 15, 2016
A Six Sigma Security Software Quality Management
Vojo Bubevski
DOI: 10.4236/jcc.2016.413004 1,213 Downloads 2,237 Views Citations
Pub. Date: October 26, 2016
The Intelligent Software Systems: The Practical Implementation of Software Security Vulnerabilities Detection Modeling
Musoni Wilson, Umutesi Liliane, Mbanzabugabo Jean Baptiste
DOI: 10.4236/oalib.1106831 27 Downloads 100 Views Citations
Pub. Date: November 16, 2020
Research on the Contents and Indexes of Reservoir Operational Security
Jingchun Feng, Zhongnan Duan
DOI: 10.4236/jwarp.2010.211115 5,629 Downloads 8,634 Views Citations
Pub. Date: November 29, 2010
Research and Analysis on Cognitive Radio Network Security
Long Tang, Juebo Wu
DOI: 10.4236/wsn.2012.44017 8,374 Downloads 14,715 Views Citations
Pub. Date: April 24, 2012