18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CRITICAL SUCCESS FACTORS FOR THE ORACLE<br />

DATABASE AUDIT<br />

Simona Felicia UNCHIASU 1 & Pavel NASTASE<br />

Bucharest Academy of Economic Studies, Romania<br />

ABSTRACT<br />

The increased use of Internet, portable devices, mobile and wireless technologies has<br />

enhanced and eased the access to information and expanded the risk of unauthorized<br />

disclosure of confidential personal, customers and business related information. All the<br />

aforementioned factors have facilitated the corporate espionage, privacy breach, data<br />

leakage and terrorism, therefore the information security topic was brought in the forefront of<br />

information technology concerns for many organizations. Expectations in terms of<br />

confidentiality, integrity and availability of the information are high, since shareholders,<br />

employees, customers and business partners demand a real-time access and accurate data.<br />

Risks associated with such information systems need to be addressed. An effective approach<br />

must consider the risks introduced by all components of an information system, like<br />

application, operating system, network and telecommunication, databases, interfaces with<br />

other legacy systems and by the physical environment. In the past, many IT audits were<br />

performed just at the application or at the network level and quite frequently the database<br />

was overlooked, even though it is the repository for critical data and therefore a key<br />

component of any information system. Loosing data confidentiality, integrity and availability<br />

can cost a company not only in terms of sales but in reputation and litigation costs also.<br />

Currently, the interest in auditing databases has increased due to the growing legal and<br />

regulatory frameworks as well. Having this in our mind, we tried to propose in this article an<br />

audit plan that best covers the ORACLE databases vulnerabilities and hardening issues. The<br />

audit plan is based on literature review, COBIT framework and our own practical<br />

experiences with databases. We analyzed the COBIT framework and we selected the<br />

processes and the relevant control objectives that are critical for the database control and we<br />

translated them into audit steps.<br />

KEYWORDS: IT Governance, COBIT, Data breach, Database vulnerabilities, Database<br />

audit program<br />

INTRODUCTION<br />

The increased use of Internet, portable computer devices, mobile and wireless<br />

technologies has enhanced and eased the access to information and expanded the risk<br />

of unauthorized disclosure of confidential personal, customers and business related<br />

information. All the aforementioned factors have facilitated the corporate espionage,<br />

privacy breach and terrorism, therefore the information security topic was brought in<br />

the forefront of information technology concerns for many organizations. The new<br />

technological developments have provided new opportunities for the occurrence of<br />

information systems related problems such as data leakage, identity theft, malicious<br />

1 Correspondence address: Simona Felicia UNCHIASU, CISA, CRISC, Ph.D. student, Bucharest<br />

Academy of Economic Studies, Romania; email: simonaunchiasu@yahoo.com<br />

~ 287 ~

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!