Home Database Mysql Tutorial 次级信息源如何使您的企业面临风险

次级信息源如何使您的企业面临风险

Jun 07, 2016 pm 05:54 PM
enterprise risk

运用加密技术保护数据库是一项基本的信息安全最佳实践,也是受合规遵从指令影响的信息的一个要求。然而,主数据存储以外的地方(如临时文件、提取-转换-加载 (ETL) 数据、调试文件、日志文件和其他次要来源)也存在未加密的数据。许多企业甚至没有意识到自身

运用加密技术保护是一项基本的信息安全最佳实践,也是受合规遵从指令影响的信息的一个要求。然而,主数据存储以外的地方(如临时文件、提取-转换-加载 (ETL) 数据、调试文件、日志文件和其他次要来源)也存在未加密的数据。许多企业甚至没有意识到自身网络中可能存有这类未加密的敏感数据。根据 Verizon Payment Card Industry Compliance Report,之外的未加密数据常常遭到黑客窃取,因为这些数据十分容易获得。在思考如何保护 IBM DB2 数据时,绝大部分企业都很清楚需要加密 DB2 表空间和数据库活动监控。不过,人们往往会忽略对数据库内部信息以外的数据库周边信息的保护。虽然仅对数据库本身进行加密似乎足以保护 DB2 内部的静态数据,但企业还需要考虑可能存在敏感数据的其他数据库周边位置。

其中许多位置并不在数据库管理员 (DBA) 的直接控制之下。例如,数据库脚本通常包含用于访问数据库的用户名和密码。如果数据库损坏,那么这些类型的文件可能会产生数据库漏洞。

另一项风险在于 DB2 的外部文件行为。DB2 错误等行为可能会生成包含敏感数据的跟踪文件或警报日志。举例来说,DB2 以外的一些敏感数据位置包括目录文件、事务日志以及包含诊断日志、报告、导出文件、ETL 数据和脚本的外部文件(参见图 1)。

次级信息源如何使您的企业面临风险

图 1. 可能包含敏感信息的 IBM DB2 相关文件

图片文字:
Catalog Files:目录文件
Tablespaces:表空间
User:用户
System:系统
TEMP:TEMP
Transaction logs:事务日志
Online:在线
Archive:存档
External files:外部文件
Operates on database:数据库上的操作
Diagnostic logs:诊断日志
Reports:报告
Exports:导出文件
Backups:备份
Scripts:脚本

下面是一份包含所有外部 DB2 文件和子类型文件的名单,同时还介绍了它们提供的功能,以及它们为什么应当受到保护。

目录文件

通常情况下,这些配置文件用于定义与数据库相关的 IBM DB2 初始化参数。其中包含诸如数据库名称和所用的端口等信息。如果配置信息被认定为敏感信息,那么系统就会对其进行保护。

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

This company officially entered Jinqiao and became the leader in the metaverse field! This company officially entered Jinqiao and became the leader in the metaverse field! Oct 09, 2023 pm 12:45 PM

Recently, Shanghai Yaojing Internet Information Technology Co., Ltd. has officially entered Jinqiao, building a digital bridge connecting reality and virtuality and leading to the future, leading a new development direction. Shanghai Yaojing Internet Information Technology Co., Ltd. focuses on the domestic metaverse industry and has successfully Create a metaverse interactive social platform for B2B2C end users - Yaojing YAOLAND. Relying on its unique and outstanding core capabilities, the company has won a number of Yuanverse projects from the government and brand enterprises, including the construction and operation of the 2022 Shanghai Super Demonstration Scenario, and was selected into the top 40 enterprises with industrial application and pioneering technology potential in the Metaverse. The company's main display platform, Yaojing Metaverse, as the first-tier leader, uses web3.0 to fully immerse 3D interactive scenes, gamify user operations, virtual and real

Is there any risk in making money with Toutiao Express Edition? An explanation of whether the software is harmful Is there any risk in making money with Toutiao Express Edition? An explanation of whether the software is harmful Mar 12, 2024 pm 08:30 PM

Is there any risk in making money on Toutiao Express Edition? I believe that players only care about watching the news and earning gold coins, but they don’t know whether there are risks in this software that may harm us. So how should we know whether this software will harm our information? The following is an explanation of whether the software brought by the editor is harmful. I hope that new and old users can come and refer to it. After all, it is related to their own personal safety and security. The editor still wants to remind all users to pay attention to their own safety and security. An explanation of whether there are any dangers in Toutiao Express Edition software? It is relatively safe to make money with Toutiao Express Edition. After all, ByteDance is a big company. But there is not much difference in function between the express version of Toutiao and Toutiao. They just change the shell. This is just

Ten methods in AI risk discovery Ten methods in AI risk discovery Apr 26, 2024 pm 05:25 PM

Beyond chatbots or personalized recommendations, AI’s powerful ability to predict and eliminate risks is gaining momentum in organizations. As massive amounts of data proliferate and regulations tighten, traditional risk assessment tools are struggling under the pressure. Artificial intelligence technology can quickly analyze and supervise the collection of large amounts of data, allowing risk assessment tools to be improved under compression. By using technologies such as machine learning and deep learning, AI can identify and predict potential risks and provide timely recommendations. Against this backdrop, leveraging AI’s risk management capabilities can ensure compliance with changing regulations and proactively respond to unforeseen threats. Leveraging AI to tackle the complexities of risk management may seem alarming, but for those passionate about staying on top in the digital race

What are the risks of java deserialization? What are the risks of java deserialization? Apr 15, 2024 pm 04:06 PM

Risks of Java Deserialization Java deserialization is a method of restoring the serialized object state into memory. It enables developers to store objects and retrieve them later in another application. However, deserialization can also lead to serious risks, such as remote code execution (RCE). Risks When deserializing a maliciously serialized object, a Java application may be exposed to the following risks: Remote Code Execution (RCE): Malicious code can be stored in the serialized object and executed through deserialization. This allows an attacker to run arbitrary code on the target system. Sensitive information disclosure: Deserialized objects may contain sensitive information such as passwords, tokens, or financial data. An attacker can access this information and use it to compromise the system

Top 10 AI unicorns that will transform the tech industry in 2022 Top 10 AI unicorns that will transform the tech industry in 2022 Apr 11, 2023 pm 07:27 PM

Currently, artificial intelligence is moving towards independence. Global businesses have adapted to this interdisciplinary field and are creating a paradigm shift in almost all businesses. Major AI companies are delivering some of the most cutting-edge innovations to ensure business continues to move forward. Here is a list of the top AI unicorns that will transform global businesses in 2022. H2O.aiH2O.ai focuses on solving complex business problems while accelerating the discovery of new technology ideas. AutoML's comprehensive capabilities transform artificial intelligence into AI for professional-level accuracy, speed, and transparency. It serves multiple industries such as financial services, healthcare, telecommunications, manufacturing, insurance and retail, while also specializing in fraud detection, churn prediction, credit risk coverage, etc.

Improper PHP password verification mechanism: How to avoid the risk of incorrect password login? Improper PHP password verification mechanism: How to avoid the risk of incorrect password login? Mar 09, 2024 pm 12:54 PM

Improper PHP password verification mechanism: How to avoid the risk of incorrect password login? In web development, the security of user passwords has always been an extremely important issue. When using PHP to develop web applications, how to avoid the risk of logging in with incorrect passwords has become a key concern for developers. This article will introduce how to strengthen users' password security through a correct password verification mechanism and avoid the risk of incorrect password login. 1. When using password hash storage to store user passwords, they must not be stored in clear text in the database. This will greatly

4 possible threats to Bitcoin 4 possible threats to Bitcoin Jan 18, 2024 pm 02:42 PM

Calm down and talk about what I have been thinking about recently - 4 possibilities to kill Bitcoin: 1. Black boxing of assets: Last night in Space, I talked about the possible long-term negative impact of ETFs: that is, when the market value of its holdings exceeds 30%, plus the 10% in CEX, the 10% lost and the "coining" of derivatives, the black box holdings account for more than 50%, which actually breaks down the decentralization and liquidity of Bitcoin assets. In fact, the market value of Bitcoin spot + futures ETF has reached US$33 billion, accounting for 3.5% of the circulation ratio. In the next two cycles, the market value may account for more than 20%. 2. Nationalization of the mining side: Miners no longer enjoy a one-year return on investment and an annualized return of more than 30% in four years. Instead, they gradually switch to the average return rate of the mainstream currency market, which is less than 5%.

Explore the success cases of Go language in well-known enterprises Explore the success cases of Go language in well-known enterprises Mar 01, 2024 pm 06:03 PM

Explore the successful cases of Go language in well-known enterprises. In today's digital era, software development has become an indispensable part of major enterprises' market competition. In order to improve efficiency, reduce costs, and improve user experience, companies have paid attention to and adopted different programming languages. Among them, as an open source programming language developed by Google, Go language has emerged in recent years and is widely used in major well-known companies. This article will explore the success cases of Go language in well-known enterprises and analyze specific code examples. Google

See all articles