Lecture 4 Flashcards

Auditing and Monitoring Databases

1
Q

Database auditing vs monitoring: (!!)

A
  • Auditing: documenting and recording all database activity in detail, like logins or modifications.
  • Monitoring: real-time observation of database activity and performance, to detect anomalies as they happen.

Both are used to ensure security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 3 types of activity monitored in auditing: (!!)

A

-Logins
-Modifications
-Transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 key metrics to look at in performance monitoring? (!!)

A

-Query execution time.
-CPU usage.
-Memory usage.
-disk input and output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name 3 benefits of performance monitoring: (!!)

A

-Performance optimization.
-Efficiency in resource usage.
-Identifying patterns to make predictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is machine learning and how does it help prevent attacks? (!!)

A

Machine learning is a form of ai that learns and improves from data over time.
It has an enhanced ability to detect patterns that traditional rule-based systems might miss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 3 benefits of machine learning in auditing? (!!)

A

-Automated learning.
-Less false positives.
-Real-time threat detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is blockchain technology and how is it used in auditing? (!!)

A

A system that records data in a chain of permanent, unchangeable blocks, called ledgers.
It helps in recording database activity securely, as blocks are immutable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 benefits of using blockchain in auditing? (!!)

A

-Transparency: Every transaction recorded is visible to authorized parties.

-Decentralization: no central authority that attackers can attack.

-Enhanced cryptographic security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a possible future application of blockchain in auditing?

A

Integration of blockchain with machine learning, where a secure ledger of data is created using blockchain then be analyzed by machine learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is predictive analytics?

A

a technique that uses data to identify patterns and prevent problems like bottlenecks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s automated remediation? (!!)

A

It detects and automatically resolves issues in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List 3 examples of actions that automated remediation can do: (!!)

A

-Resource management: automatically allocates resources like memory to avoid exceeding limits.

-Automatic patches and updates.

-Load balancing: dynamically rerouting queries to less loaded servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 3 benefits of automated remediation? (!!)

A

-Reducing downtime.
-Cost-effective: can do the work instead of employees.
-Scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is privacy-preserving auditing and why is it important? (!!)

A

It’s the practice of auditing while keeping sensitive information private. It is important due to increasing privacy concerns and regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 2 benefits of privacy-preserving auditing? (!!)

A

-Maintaining confidentiality during audits.
-Compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 3 techniques used to ensure privacy during auditing? (!!)

A

-Homomorphic Encryption: operating on encrypted data without decrypting it. Slower and resource-extensive.

-Anonymization: removing or altering PIIs so that data cannot be linked to individuals.

-Pseudonymization: replaces sensitive information with pseudonyms that can be re-identified. It can be coupled with anonymization.