dc.contributor.author |
Hauger, W.K. (Werner)
|
|
dc.contributor.author |
Olivier, Martin S.
|
|
dc.date.accessioned |
2019-03-04T10:08:06Z |
|
dc.date.available |
2019-03-04T10:08:06Z |
|
dc.date.issued |
2018-06 |
|
dc.description.abstract |
NoSQL databases have gained a lot of popularity over the last few years. They are now
used in many new system implementations that work with vast amounts of data. Such data will
typically also include sensitive information that needs to be secured. NoSQL databases are also
underlying a number of cloud implementations which are increasingly being used to store sensitive
information by various organisations. This has made NoSQL databases a new target for hackers and
other state sponsored actors. Forensic examinations of compromised systems will need to be conducted
to determine what exactly transpired and who was responsible. This paper examines specifically if
NoSQL databases have security features that leave relevant traces so that accurate forensic attribution
can be conducted. The seeming lack of default security measures such as access control and logging
has prompted this examination. A survey into the top ranked NoSQL databases was conducted to
establish what authentication and authorisation features are available. Additionally the provided logging
mechanisms were also examined since access control without any auditing would not aid forensic
attribution tremendously. Some of the surveyed NoSQL databases do not provide adequate access
control mechanisms and logging features that leave relevant traces to allow forensic attribution to be
done using those. The other surveyed NoSQL databases did provide adequate mechanisms and logging
traces for forensic attribution, but they are not enabled or configured by default. This means that in
many cases they might not be available, leading to insufficient information to perform accurate forensic
attribution even on those databases. |
en_ZA |
dc.description.department |
Computer Science |
en_ZA |
dc.description.librarian |
am2019 |
en_ZA |
dc.description.uri |
http://www.saiee.org.za/DirectoryDisplay/DirectoryCMSPages.aspx?name=Publications#id=1588&dirname=ARJ&dirid=337 |
en_ZA |
dc.identifier.citation |
Hauger, W.K. & Olivier, M.S. 2018, 'NoSQL databases : forensic attribution implications', SAIEE Africa Research Journal, vol. 109, no. 2, pp. 119-132. |
en_ZA |
dc.identifier.issn |
1991-1696 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/68549 |
|
dc.language.iso |
en |
en_ZA |
dc.publisher |
South African Institute of Electrical Engineers |
en_ZA |
dc.rights |
© 2018 South African Institute of Electrical Engineers |
en_ZA |
dc.subject |
Database forensics |
en_ZA |
dc.subject |
Forensic attribution |
en_ZA |
dc.subject |
NoSQL |
en_ZA |
dc.subject |
Survey |
en_ZA |
dc.subject |
Digital forensics |
en_ZA |
dc.subject |
System implementation |
en_ZA |
dc.subject |
Sensitive information |
en_ZA |
dc.subject |
Security features |
en_ZA |
dc.subject |
Logging mechanism |
en_ZA |
dc.subject |
Forensic examination |
en_ZA |
dc.subject |
Access control mechanism |
en_ZA |
dc.subject |
Surveying |
en_ZA |
dc.subject |
Personal computing |
en_ZA |
dc.subject |
Database systems |
en_ZA |
dc.subject |
Authentication |
en_ZA |
dc.title |
NoSQL databases : forensic attribution implications |
en_ZA |
dc.type |
Article |
en_ZA |