数据库审计系统技术白皮书目录1前言...........................................................................................................................................12数据库审计的重要性...............................................................................................................22.1满足合规性要求.......................................................................................................22.2降低安全性风险.......................................................................................................42.2.1数据完整性安全...............................................................................................42.2.2内部人员权限滥用...........................................................................................52.2.3授权人员的非法操作.......................................................................................52.2.4维护人员非法操作...........................................................................................52.2.5技术风险...........................................................................................................52.3监测可用性风险.......................................................................................................62.4避免审计风险...........................................................................................................62.5弥补传统安全技术的盲点.......................................................................................72.5.1传统安全设备的盲点.......................................................................................72.5.2数据库自身日志审计的缺陷与危害...............................................................83慧眼数据库审计系统简介.......................................................................................................93.1慧眼数据库审计系统介绍.......................................................................................93.2慧眼数据库审计系统体系架构.............................................................................104产品功能特点.........................................................................................................................114.1防止管理员权限滥用.............................................................错误!未定义书签。4.2降低维护人员的安全隐患.....................................................错误!未定义书签。4.3保护重要数据安全.................................................................错误!未定义书签。4.4保障业务连续性.....................................................................错误!未定义书签。4.5优秀的处理性能.....................................................................错误!未定义书签。4.6强大的分析能力.....................................................................错误!未定义书签。4.7全面的信息分析能力.............................................................错误!未定义书签。4.8快速响应预警机制.................................................................错误!未定义书签。4.9多角度的展现能力.................................................................错误!未定义书签。5产品优势.................................................................................................................................185.1权能关联模型.........................................................................错误!未定义书签。...