Database forensics: Difference between revisions

Content deleted Content added
Rescuing 2 sources and tagging 0 as dead. #IABot (v2.0beta15)
Monkbot (talk | contribs)
m top: Task 16: replaced (1×) / removed (0×) deprecated |dead-url= and |deadurl= with |url-status=;
Line 9:
Software tools can be used to manipulate and analyse data. These tools also provide audit logging capabilities which provide documented proof of what tasks or analysis a forensic examiner performed on the database.
 
Currently many database software tools are in general not reliable and precise enough to be used for forensic work as demonstrated in the first paper published on database forensics.<ref>{{Cite web |url=http://www.giac.org/certified_professionals/practicals/gcfa/0159.php |title=Oracle Database Forensics using LogMiner - GIAC Certified Student Practical<!-- Bot generated title --> |access-date=2006-04-08 |archive-url=https://web.archive.org/web/20060428163551/http://www.giac.org/certified_professionals/practicals/gcfa/0159.php |archive-date=2006-04-28 |dead-url-status=yesdead }}</ref>
There is currently a single book published in this field,<ref>Oracle Forensics {{ISBN|0-9776715-2-6}} (May 2008)</ref> though more are destined.<ref>Oracle Forensics Using Quisix {{ISBN|0-470-19118-X}} (Dec 2008)</ref>
Additionally there is a subsequent SQL Server forensics book by Kevvie Fowler named SQL Server Forensics which is well regarded also.<ref>SQL Server Forensics {{ISBN|0-321-54436-6}} (Dec 2008)</ref>