The effective method of database server forensics on the enterprise environment
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Son, Namheun | - |
dc.contributor.author | Lee, Keungi | - |
dc.contributor.author | Jeon, SangJun | - |
dc.contributor.author | Lee, Sangjin | - |
dc.contributor.author | Lee, Changhoon | - |
dc.date.accessioned | 2021-09-06T15:13:14Z | - |
dc.date.available | 2021-09-06T15:13:14Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2012-10 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/107412 | - |
dc.description.abstract | When a forensic investigation is carried out in the enterprise environment, most of the important data are stored in database servers, and data stored in them are very important elements for a forensic investigation. As for database servers with such data stored, there are over 10 various kinds, such as SQL Server and Oracle. All the methods of investigating a database system are important, but this study suggests a single methodology likely to investigate all the database systems while considering the unique characteristics of each database system. A method of detecting a server and acquiring and investigating data in the server can be effectively used for such an investigation on the enterprise environment. For the existing investigation on server systems, severs should be shut down, and disc imaging should be conducted first. However, such a method may inflict great losses on the company in some cases. That is why we need a method to acquire data of a server in on-line state, and this study discusses this method. Besides, on the basis of methodology, this study attempts to determine a possibility that this new forensic investigation method can be practically used by directly applying this method to SQL Server and MySQL databases. Copyright (c) 2012 John Wiley & Sons, Ltd. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.title | The effective method of database server forensics on the enterprise environment | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Sangjin | - |
dc.identifier.doi | 10.1002/sec.510 | - |
dc.identifier.scopusid | 2-s2.0-84867616572 | - |
dc.identifier.wosid | 000309238700002 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.5, no.10, pp.1086 - 1093 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 5 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 1086 | - |
dc.citation.endPage | 1093 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | forensic | - |
dc.subject.keywordAuthor | enterprise | - |
dc.subject.keywordAuthor | database server | - |
dc.subject.keywordAuthor | network topology | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.