Lecture 6 Flashcards

Database Auditing in Incident Response & Fraud Detection

1
Q

What is incident response?

A

How an organization identifies, reacts, and recovers from a security issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key steps in incident response? (list 5)

A

1- Preparation: having clear response plans.

2- Identification: detecting and identifying the issue.

3- Containment: containing the threat from spreading further.

4- Eradication: removing the threat.

5- Recovery: restoring to normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does auditing help in incident response? (list 3 points)

A

-Helps detect suspicious behavior.

-Helps in investigating attacks and making a post-incident review.

-Help find the cause of incident to remove the threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how can auditing help in fraud detection? (!!)

A

Auditing keeps record of all database activity, which helps in investigations and anomaly detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List 3 types of fraud that can be detected using auditing:

A

-Insider Threat: employees who misuse their access.

-Financial fraud: manipulating financial data.

-Data Theft: authorized copying of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 3 fraud detection techniques that are enhanced by database auditing? (!!)

A

-Anomaly detection via historical records.
-Data integrity monitoring.
-Privilege escalation detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly