Lecture 6 Flashcards
Database Auditing in Incident Response & Fraud Detection
What is incident response?
How an organization identifies, reacts, and recovers from a security issue.
What are the key steps in incident response? (list 5)
1- Preparation: having clear response plans.
2- Identification: detecting and identifying the issue.
3- Containment: containing the threat from spreading further.
4- Eradication: removing the threat.
5- Recovery: restoring to normal operations.
How does auditing help in incident response? (list 3 points)
-Helps detect suspicious behavior.
-Helps in investigating attacks and making a post-incident review.
-Help find the cause of incident to remove the threat.
how can auditing help in fraud detection? (!!)
Auditing keeps record of all database activity, which helps in investigations and anomaly detection.
List 3 types of fraud that can be detected using auditing:
-Insider Threat: employees who misuse their access.
-Financial fraud: manipulating financial data.
-Data Theft: authorized copying of data.
What are 3 fraud detection techniques that are enhanced by database auditing? (!!)
-Anomaly detection via historical records.
-Data integrity monitoring.
-Privilege escalation detection