Content deleted Content added
No edit summary |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 5:
The discipline is similar to [[computer forensics]], following the normal forensic process and applying investigative techniques to database contents and metadata. Cached information may also exist in a [[Server (computing)|servers]] [[RAM]] requiring [[Digital forensics#live analysis|live analysis]] techniques.
A forensic examination of a database may relate to the timestamps that apply to the update time of a row in a relational table being inspected and tested for validity in order to verify the actions of a database user.
Software tools can be used to manipulate and analyse data. These tools also provide audit logging capabilities which provide documented proof of what tasks or analysis a forensic examiner performed on the database.
The forensic study of relational databases requires a knowledge of the standard used to encode data on the computer disk. A documentation of standards used to encode information in well-known brands of DB such as SQL Server and Oracle has been contributed to the public ___domain.<ref>[http://www.sans.org/reading_room/whitepapers/forensics/1906.php SANS Institute – Forensic Analysis of a SQL Server 2005 Database Server<!-- Bot generated title -->]</ref><ref>[http://www.databasesecurity.com/oracle-forensics.htm Oracle Forensics and Incident Response - databasesecurity.com<!-- Bot generated title -->] {{webarchive |url=https://web.archive.org/web/20130908135737/http://www.databasesecurity.com/oracle-forensics.htm |date=September 8, 2013 }}</ref> Others include Apex Analytix.<ref>{{cite news |author1=Mick Normington |title=Ready for take off |url=http://www.bizjournals.com/triad/stories/2004/01/05/story3.html |access-date=3 December 2022 |work=The Business Journal |date=5 January 2004 |___location=Greensboro}}</ref>
|