@inproceedings{95e2db188482418ea90bbc5685ca44e8,
title = "Scenario-Based Digital Forensic Investigation of Compromised MySQL Database",
abstract = "Insider and outsider database threats have more often than not posed a greater challenge as far as integrity and investigation of databases is concerned. Database forensic investigation is a process through which scientifically proven methods can be used to create a hypothesis that can prove or disprove the occurrence of a potential security incident. This paper explores the techniques that can be used to conduct forensic investigations of a compromised MySQL database. The authors have simulated investigative scenarios that have aided to conduct forensic investigative processes and the results are promising.",
keywords = "Database, Database forensics, Database management system, Forensic configuration, MySQL, MySQL forensic investigation process",
author = "Taurai Hungwe and Venter, {Hein S.} and Kebande, {Victor R.}",
note = "Publisher Copyright: {\textcopyright} 2019 The authors.; 2019 IST-Africa Week Conference, IST-Africa 2019 ; Conference date: 08-05-2019 Through 10-05-2019",
year = "2019",
month = may,
doi = "10.23919/ISTAFRICA.2019.8764819",
language = "English",
series = "2019 IST-Africa Week Conference, IST-Africa 2019",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
editor = "Paul Cunningham and Miriam Cunningham",
booktitle = "2019 IST-Africa Week Conference, IST-Africa 2019",
address = "United States",
}