Abstract
Data and information are sometimes called the “crown jewels” of an organization [3]. Modern company cannot exist without flexible, fast and secure data management system. Insuring data security is of vital importance for any company.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cheswick B (1991) An Evening with Berferd in which a Cracker is Lured, Endured, and Studied. www.tracking-hackers.com/papers/berferd.pdf
Čenys A, Rainys D, Radvilavičius L, Bielko A (2004) Development of Honeypot System Emulating Functions of Database Server. Proc of the NATO “Symposium on Adaptive Defense in Unclassified Networks”. Toulouse France April 19–20 2004. www.rta.nato.int/abstracts.asp
Finnigan P (2003) Introduction to Simple Oracle Auditing, www.petefinnigan.com/
Nanda A (2003) Fine-Grained Auditing for Real-World Problems. www.oracle.com/technology/oramag/webcolumns/2003/techarticles/nanda_f ga.html
Schneier B, Wiley J (2000) Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons New York
Stoll C (1990), Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage. Pocket Books New York
Spitzner L (2002) Honeypots: Tracking Hackers. www.spitzner.net/
Spitzner L (2003) Honeypots: Definitions and Value of Honeypots. www.tracking-hackers.comlpapers/honeypots.html
Spitzner L (2003) Honeytokens: The Other Honeypot. www.securityfocus.comlinfocus/1713
Thompson N (2003) New Economy. www.nytco.coml
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science-Business Media, LLC
About this paper
Cite this paper
Čenys, A., Rainys, D., Radvilavicius, L., Goranin, N. (2006). Database Level Honeytoken Modules for Active DBMS Protection. In: Nilsson, A.G., Gustas, R., Wojtkowski, W., Wojtkowski, W.G., Wrycza, S., Zupančič, J. (eds) Advances in Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-36402-5_38
Download citation
DOI: https://doi.org/10.1007/978-0-387-36402-5_38
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30834-0
Online ISBN: 978-0-387-36402-5
eBook Packages: Computer ScienceComputer Science (R0)