Information Security Research Library

Powered by


While splashy external threats like denials-of-service and Trojan-based botnets might get all of the attention, many of the more dangerous threats to enterprise security lie inside the corporate firewall. Employees, partners, customers, consultants and other trusted insiders need access to sensitive documents and data in order to do their jobs, but ensuring that they don't abuse that trust by stealing company records, overstepping their permissions or erasing vital records is a major headache. A recent survey of more than 700 security professionals found that more than 74% of respondents consider detecting and thwarting internal attacks to be a top priority for 2008. In this video, you will learn:

  • How to implement internal controls to monitor access to sensitive database records
  • Effective access-control policies
  • Defenses against common database configuration mistakes
Interested in this topic, but prefer alternative content formats? Try:


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.