Content deleted Content added
removed links to deleted page(s) per WP:RED |
Rescuing 2 sources and tagging 0 as dead. #IABot (v2.0beta15) |
||
Line 9:
Software tools can be used to manipulate and analyse data. These tools also provide audit logging capabilities which provide documented proof of what tasks or analysis a forensic examiner performed on the database.
Currently many database software tools are in general not reliable and precise enough to be used for forensic work as demonstrated in the first paper published on database forensics.<ref>
There is currently a single book published in this field,<ref>Oracle Forensics {{ISBN|0-9776715-2-6}} (May 2008)</ref> though more are destined.<ref>Oracle Forensics Using Quisix {{ISBN|0-470-19118-X}} (Dec 2008)</ref>
Additionally there is a subsequent SQL Server forensics book by Kevvie Fowler named SQL Server Forensics which is well regarded also.<ref>SQL Server Forensics {{ISBN|0-321-54436-6}} (Dec 2008)</ref>
Line 20:
* Farmer and Venema, 1999, http://www.porcupine.org/forensics/forensic-discovery/appendixB.html
* Sarbanes Oxley section 404 – enforce financial standards to limit chance of fraud. http://thecaq.aicpa.org/Resources/Sarbanes+Oxley/
* HIPAA – Health and Portability Act https://web.archive.org/web/20051219200504/http://www.cms.hhs.gov/hipaa/
* Fair Credit Reporting Act (FCRA) http://www.gao.gov/new.items/d06674.pdf
* Oracle Forensics In a Nutshell, Paul M. Wright (May 2007) http://www.oracleforensics.com/wordpress/wp-content/uploads/2007/03/OracleForensicsInANutshell.pdf
|