Essays about: "Audit log"
Showing result 1 - 5 of 8 essays containing the words Audit log.
-
1. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
2. Using Elasticsearch for full-text searches on unstructured data
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : In order to perform effective searches on large amounts of data it is not viable to simply scan through all of said data. A well established solution for this problem is to generate an index based on the data. READ MORE
-
3. Managing the challenges of event sourcing : Versioning and incorrect states
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Event sourcing has caught the interest of many developers due to desirable features such as an implicit audit log and a simplified database design. This thesis presents a case study with a focus on managing the challenges of versioning and correcting incorrect states. READ MORE
-
4. Visualizing audit log events at the Swedish Police Authority to facilitate its use in the judicial system
University essay from Luleå tekniska universitet/Digitala tjänster och systemAbstract : Within the Swedish Police Authority, physical users’ actions within all systems that manage sensitive information, are registered and sent to an audit log. The audit log contains log entries that consist of information regarding the events that occur by the performing user. READ MORE
-
5. Enhancing the security of an audit log
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : In todays society data breaches have become an all too common issue. Insecure databases allows intruders to access sensitive data. This thesis examines how to enhance the security of a relational database. The database is used as an audit log in a system platform at LeanOn AB. READ MORE