CN116416075A - Connection information acquisition system in database security audit - Google Patents

Connection information acquisition system in database security audit Download PDF

Info

Publication number
CN116416075A
CN116416075A CN202310236834.1A CN202310236834A CN116416075A CN 116416075 A CN116416075 A CN 116416075A CN 202310236834 A CN202310236834 A CN 202310236834A CN 116416075 A CN116416075 A CN 116416075A
Authority
CN
China
Prior art keywords
module
acquisition
connection information
audit
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310236834.1A
Other languages
Chinese (zh)
Inventor
戴敏
伍毅
巫东航
史珂
李维春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Civil Aviation Flight University of China
Original Assignee
Civil Aviation Flight University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Civil Aviation Flight University of China filed Critical Civil Aviation Flight University of China
Priority to CN202310236834.1A priority Critical patent/CN116416075A/en
Publication of CN116416075A publication Critical patent/CN116416075A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

The invention discloses a connection information acquisition system in database security audit, and belongs to the technical field of audit. The system comprises an acquisition module, wherein the acquisition module is connected with an acquisition audit module, the acquisition audit module is further connected with a judging unit, the judging unit is connected with an intercepting module, the intercepting module is connected with an extracting module, the extracting module is connected with an analyzing module, and the analyzing module is connected with a database. The acquisition module is used for receiving external acquisition requirements and acquiring connection information in external security audit aiming at a database, the acquisition audit module is used for carrying out preliminary identification on the acquisition requirements of the other party and judging whether an issuer meets the requirements, and the judging unit is used for judging whether the acquisition requirements are safe or not. The invention effectively solves the problem that the audit system is easy to be stolen by external lawbreakers, and the account information of the company is easy to be hacked by the external so as to be known by competitors.

Description

Connection information acquisition system in database security audit
Technical Field
The invention relates to the technical field of audit, in particular to a connection information acquisition system in database security audit.
Background
Audit is used as a supervision mechanism, and the audit is realized with a long history of activity.
The invention with publication number CN104036000B discloses a method, a device and a system for auditing a database, wherein the method comprises the steps of obtaining marking information of all terminal equipment in a network and identity information bound with the terminal equipment from a network access server, wherein the marking information and the identity information have a mapping relation; when terminal equipment in the network accesses a database, acquiring access information of the terminal equipment, and acquiring marking information of the terminal equipment according to the access information; and acquiring the identity information mapped by the marking information according to the marking information, and auditing according to the identity information and an auditing rule. By means of the method, identity audit can be conducted when the terminal equipment accesses the database, and the safety of the database is improved.
But the security of the connection information acquisition system in the existing database security audit is poor, and the connection information acquisition system is easy to be stolen by external lawbreakers, so that the account information of a company is subject to external hacking, and thus competitors can know the information.
Disclosure of Invention
Audit evidence is necessary to support audit opinion and audit reporting. Audit evidence is cumulative in nature, and is obtained by implementing an audit program during an audit process, and may also include information obtained from other sources, such as previous audits (provided that a registered accountant has determined whether the audited entity and its environment have changed since the previous audit, and may affect the relevance of such information to the current audit), or information obtained during the acceptance and maintenance of customer relationships and specific business at the accountant's business. Accounting records are also an important source of audit evidence in addition to information obtained from other sources both internal and external to the audited entity. Information that can be used as audit evidence may also take advantage of the work of the expert at the management layer during the programming process. Audit evidence includes both information supporting and approving the certification by the management layers and information contradicting these certification. In some cases, the lack of information (e.g., administrative layer refusal to provide a statement required by the registered accountant) itself also constitutes audit evidence that can be utilized by the registered accountant.
The invention aims to provide a connection information acquisition system in database security audit, which aims to solve the problems in the background technology:
but the security of the connection information acquisition system in the existing database security audit is poor, and the connection information acquisition system is easy to be stolen by external lawbreakers, so that the account information of a company is subject to external hacking, and thus competitors can know the information.
Social audits are also known as register accountant audits or independent audits. Refers to the act of registering accountants to accept commissions in law, independent practice, and to provide professional services to society for compensation. Society as used herein refers to enterprises, professional services including auditing reports from accounting reports of the auditing enterprises, corporate verification of enterprise capital, reporting of investment tests, corporate handling and merging, discrete, clearing matters, and other auditing services, all of which are proof of legal effectiveness.
The system comprises an acquisition module, wherein the acquisition module is connected with an acquisition audit module, the acquisition audit module is further connected with a judging unit, the judging unit is connected with an intercepting module, the intercepting module is connected with an extracting module, the extracting module is connected with an analyzing module, and the analyzing module is connected with a database.
Preferably, the obtaining module is configured to receive an external obtaining requirement, obtain connection information in security audit of the database, the obtaining audit module is configured to primarily identify the obtaining requirement of the other party, determine whether the sender meets the requirement, the determining unit is configured to determine whether the obtaining requirement is safe, determine whether the inside of the obtaining requirement contains an offensive program, the intercepting module is configured to intercept encrypted information in the obtaining requirement, facilitate decryption of the requirement, and the extracting module is configured to extract passwords intercepted by the intercepting module, where the passwords may have multiple groups, and extract and decode the passwords respectively, and the analyzing module analyzes the passwords extracted by the extracting module, and only replies to an obtaining request with correct passwords, and obtains rights to enter the database.
Preferably, the judging unit is further connected with a detection module, and the detection module is further connected with a detection recording module and an alarm module.
Preferably, the detection module detects the information of the foreign matter judged by the judging unit, the detection recording module crowds the data detected by the detection module, the alarm module gives an alarm when encountering dangerous data, and the worker rapidly solves the danger. The auditing work content is to audit the financial accounting report, and audit the enterprise asset liability list, the damage list, the cash flow list, the accounting statement notes and the related notes, which is the most common auditing business. Typically provided to stakeholders, superior units, and government authorities of the company.
Preferably, the parsing module is further connected to a system table, and the system table is used for storing user information with authority.
Preferably, the analysis module is further connected with a permission confirmation module, and the permission confirmation module is connected with the sensitive behavior recording module and the alarm module. Economic supervision is the primary responsibility of auditing. The auditing economic supervision function mainly means that the auditing and supervision of the economic activities of the audited units are carried out on a normal track within a specified range through auditing; the relevant economic responsibility person is monitored and supervised to faithfully fulfill the economic responsibility, and meanwhile, illegal and illegal century is revealed, loss and waste are checked, error and defect are found, management defects are judged, and the economic responsibility is pursued.
Preferably, the sensitive behavior recording module is used for recording sensitive behaviors of users with rights, and abnormal user access is recorded
Preferably, the audit obtaining module is further connected with the connection information monitoring module.
Preferably, the connection information monitoring module is used for monitoring connection information and changing the judgment standard of the audit acquisition module in real time.
Compared with the prior art, the invention has the advantages that:
1) The invention sets multiple verification, the acquisition audit module carries out preliminary identification on the acquisition requirement of the opposite side, judges whether the sender meets the requirement, the judging unit is used for judging whether the acquisition requirement is safe or not and judging whether the interior of the judgment unit contains an offensive program, and the detection module detects the information judged to be foreign matters in the judging unit, so that the system safety can be improved, and the audit information cannot be stolen easily.
2) The invention stores the user information with the authority through the system table, but the user with the authority does not necessarily have all the authorities, the authority confirming module can confirm the user information with the authority, the authority content is confirmed, then the sensitive behavior recording module is used for recording the sensitive behavior of the user with the authority, and the abnormal access of the user can be recorded, so that the unauthorized processing of the user is prevented.
Drawings
FIG. 1 is a schematic diagram of the overall system of the present invention.
The reference numerals in the figures illustrate: 1. an acquisition module; 2. obtaining an audit module; 3. a judging unit; 4. a intercepting module; 5. an extraction module; 6. an analysis module; 7. a database; 8. a system table; 9. connecting an information monitoring module; 10. a detection module; 11. a sensitive behavior recording module; 12. a permission confirmation module; 13. an alarm module; 14. and a detection recording module.
Detailed Description
In the description of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the apparatus or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention.
In the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "configured to," "engaged with," "connected to," and the like are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
Examples:
in forming audit opinions, most of the effort of registering accountants is to acquire and evaluate audit evidence. Audit procedures implemented to obtain audit evidence include interrogation, inspection, observation, function verification, recalculation, re-execution, and analysis procedures. The registered accountant typically combines these procedures. While a query may provide significant audit evidence, and may even provide evidence of a false positive, the query itself typically does not provide adequate audit evidence for the absence of significant false positive at the level of recognition and the validity of the internal control operations.
The utility model provides a connection information acquisition system in database security audit, includes acquisition module 1, acquisition module 1 connects acquisition audit module 2, acquisition audit module 2 still connects judgement unit 3, the interception module 4 is connected to judgement unit 3, extraction module 5 is connected to interception module 4, extraction module 5 is connected and is analyzed module 6, analysis module 6 is connected database 7.
The acquisition module 1 is used for receiving external acquisition requirements and acquiring connection information in security audit of the database 7, the acquisition audit module 2 is used for carrying out preliminary identification on the acquisition requirements of the other party and judging whether an issuer meets the requirements, the judging unit 3 is used for judging whether the acquisition requirements are safe or not and judging whether an aggressive program is contained in the acquisition requirements or not, the intercepting module 4 is used for intercepting the encryption information in the acquisition requirements and facilitating decryption of the requirements, the extracting module 5 is used for extracting passwords intercepted by the intercepting module 4, multiple groups of passwords can be extracted respectively for decoding, the analyzing module 6 analyzes the passwords extracted by the extracting module 5, the acquisition request with correct passwords can be replied, and the right of entering the database 7 is obtained.
The invention sets up multiple verification, obtain the audit module 2 to carry on the preliminary recognition to the acquisition requirement of the other side, judge whether its sender accords with the requirement, the judging unit 3 is used for judging whether to obtain the requirement is safe, judge whether it contains the offensive program in its inside, the detection module 10 detects the information judged as the foreign matter in judging unit 3, can improve the security of the system, will not make the audit information steal easily.
The appropriateness of audit evidence is a measure of the quality of audit evidence, i.e., the relevance and reliability of audit evidence in supporting the conclusions upon which audit opinions are based. The reliability of audit evidence is affected by its origin and nature and depends on the particular environment in which the audit evidence is obtained.
The judging unit 3 is further connected with a detecting module 10, and the detecting module 10 is further connected with a detecting and recording module 14 and an alarming module 13.
The detection module 10 detects the information of the foreign matter in the determination unit 3, the detection recording module 14 crowds the data detected by the detection module 10, and the alarm module 13 can acquire some data by implementing the audit program of the test accounting records when encountering dangerous data to register accountant
Audit evidence, for example, performs analysis and review procedures, re-performs procedures in accordance with financial reporting procedures, and adjusts for different classifications and uses of the same accounting information. By implementing these audit procedures, registered accountants can determine the inherent consistency of accounting records and their consistency with financial statements, giving alarms, and staff can quickly resolve hazards.
The analysis module 6 is also connected with a system table 8, and the system table 8 is used for storing user information with authority.
The analysis module 6 is also connected with a permission confirmation module 12, and the permission confirmation module 12 is connected with a sensitive behavior recording module 11 and an alarm module 13.
The sensitive behavior recording module 11 is used for recording sensitive behaviors of users with rights, and abnormal access of the users can be recorded.
The audit acquisition module 2 is also connected with a connection information monitoring module 9.
The connection information monitoring module 9 is used for monitoring connection information and changing the judgment standard of the acquisition auditing module 2 in real time.
The invention stores the user information with the authority through the system table 8, but the user with the authority does not necessarily have all the authorities, the authority confirming module 12 can confirm the user information, the authority content is confirmed, then the sensitive behavior recording module 11 is used for recording the sensitive behavior of the user with the authority, and the abnormal access of the user can be recorded, so that the unauthorized processing of the user is prevented.
The auditing method refers to the review and check of accounting records and other written articles, and the auditing method has a large proportion to the auditing work. It is mainly used for consulting accounting data, budget, plan, meeting record and various regulations.
The application range of the auditing method is as follows: the method mainly comprises the steps of 1, checking whether original certificate elements have cheating, including signature, whether contents are truly legal and compliant, and the like; whether the accounting voucher element is normative and complete, checking the signature and the like, and whether the accessory is complete and properly processed; whether each record of the account book is standard and complete or not reflects whether the content is real and legal or not; whether the report accords with accounting system and compiling requirements, the content is as follows: whether comprehensive and corresponding, correct checking relation are reflected, and the report fully reveals the financial condition 5 and other written states: and verifying the correctness of the accounting data. The document is mainly checked: the method comprises the steps of checking the certificate, checking the account table, checking the table and checking the account entity. The verification method is an audit method for proving the carried matters of accounting data of an audited unit and issuing a verification to related units or individuals, requiring a third party to confirm the business and related amounts, and if the verification result is unsatisfactory, implementing necessary alternative procedures to obtain corresponding audit evidence.
The application range of the function method comprises the following steps: assets: such as banks, accounts receivable, notes receivable, short term investments, deposits in the alternative, long term investments, crediting and stock etc.; liability class: such as payable, payable notes, etc.; or the following classes: such as property guarantees, mortgages, leases, major transactions, exceptions.
The method adopts the following modes: accumulation function: no matter whether the answer is consistent, the answer is not repeated for another time, the procedure is troublesome, and the method is used for long-term delinquent, large amount and unchanged balance. The polar function of the extinction: confirm that the agreement is not returned, the general matter of the small amount of use and audit does not receive the reply: taking an alternative procedure to take accounts receivable as an example: 1. checking whether the cash bank account after the settlement date is 2, the financial difficulty or bankruptcy of the letters and the units is carried out for the settlement item, visiting the related government departments, checking the possibility of the settlement 3, checking the contract, invoice and the like to know the real condition 4 if the inventory occurs, checking the contract, invoice and the like to verify the real condition if the letters are lost in the mailing.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the above-described embodiments, and that the above-described embodiments and descriptions are only preferred embodiments of the present invention, and are not intended to limit the invention, and that various changes and modifications may be made therein without departing from the spirit and scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (9)

1. The utility model provides a connection information acquisition system in database security audit which characterized in that: the device comprises an acquisition module (1), wherein the acquisition module (1) is connected with an acquisition audit module (2), the acquisition audit module (2) is further connected with a judging unit (3), the judging unit (3) is connected with an intercepting module (4), the intercepting module (4) is connected with an extraction module (5), the extraction module (5) is connected with an analysis module (6), and the analysis module (6) is connected with a database (7).
2. The system for obtaining connection information in a database security audit according to claim 1 wherein: the acquisition module (1) is used for receiving external acquisition requirements, acquiring connection information in security audit of the database (7), the acquisition audit module (2) is used for carrying out preliminary identification on the acquisition requirements of the other party and judging whether the sender meets the requirements, the judging unit (3) is used for judging whether the acquisition requirements are safe or not and judging whether the inside of the acquisition requirements contains an aggressive program or not, the intercepting module (4) is used for intercepting encryption information in the acquisition requirements and conveniently decrypting the requirements, the extracting module (5) is used for extracting passwords intercepted by the intercepting module (4), multiple groups of passwords can be extracted and decoded respectively, and the analyzing module (6) analyzes the passwords extracted by the extracting module (5), so that an acquisition request with correct passwords can be replied and rights for entering the database (7) are obtained.
3. The system for obtaining connection information in a database security audit according to claim 2 wherein: the judging unit (3) is further connected with the detecting module (10), and the detecting module (10) is further connected with the detecting and recording module (14) and the alarming module (13).
4. A system for obtaining connection information in a database security audit according to claim 3 and characterized by: the detection module (10) detects the information of the foreign matters judged in the judging unit (3), the detection recording module (14) is used for crowding and recording the data detected by the detection module (10), the alarm module (13) can give an alarm when dangerous data are encountered, and workers can rapidly solve the danger.
5. The system for obtaining connection information in a database security audit according to claim 2 wherein: the analysis module (6) is also connected with a system table (8), and the system table (8) is used for storing user information with authority.
6. The system for obtaining connection information in a database security audit according to claim 2 wherein: the analysis module (6) is also connected with a permission confirmation module (12), and the permission confirmation module (12) is connected with the sensitive behavior recording module (11) and the alarm module (13).
7. The system for obtaining connection information in a database security audit according to claim 6 wherein: the sensitive behavior recording module (11) is used for recording sensitive behaviors of users with rights, and abnormal access of the users is also recorded.
8. The system for obtaining connection information in a database security audit according to claim 2 wherein: the audit acquisition module (2) is also connected with the connection information monitoring module (9).
9. The system for obtaining connection information in a database security audit according to claim 8 wherein: the connection information monitoring module (9) is used for monitoring connection information and changing the judgment standard of the acquisition auditing module (2) in real time.
CN202310236834.1A 2023-03-13 2023-03-13 Connection information acquisition system in database security audit Pending CN116416075A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310236834.1A CN116416075A (en) 2023-03-13 2023-03-13 Connection information acquisition system in database security audit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310236834.1A CN116416075A (en) 2023-03-13 2023-03-13 Connection information acquisition system in database security audit

Publications (1)

Publication Number Publication Date
CN116416075A true CN116416075A (en) 2023-07-11

Family

ID=87052403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310236834.1A Pending CN116416075A (en) 2023-03-13 2023-03-13 Connection information acquisition system in database security audit

Country Status (1)

Country Link
CN (1) CN116416075A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080098304A (en) * 2007-11-05 2008-11-07 김용규 Method for management of database access control and protection of database access account
CN103310161A (en) * 2012-03-14 2013-09-18 北京海泰方圆科技有限公司 Protection method and system for database system
CN112653556A (en) * 2020-12-24 2021-04-13 光大兴陇信托有限责任公司 TOKEN-based micro-service security authentication method, device and storage medium
CN114048503A (en) * 2021-11-05 2022-02-15 苏州陇上月信息科技有限公司 Method for acquiring connection information in database security audit

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080098304A (en) * 2007-11-05 2008-11-07 김용규 Method for management of database access control and protection of database access account
CN103310161A (en) * 2012-03-14 2013-09-18 北京海泰方圆科技有限公司 Protection method and system for database system
CN112653556A (en) * 2020-12-24 2021-04-13 光大兴陇信托有限责任公司 TOKEN-based micro-service security authentication method, device and storage medium
CN114048503A (en) * 2021-11-05 2022-02-15 苏州陇上月信息科技有限公司 Method for acquiring connection information in database security audit

Similar Documents

Publication Publication Date Title
US8745759B2 (en) Associated with abnormal application-specific activity monitoring in a computing network
Alisherovich et al. Internal Control in Banks
Haworth et al. SARBANES--OXLEY: ACHIEVING COMPLIANCE BY STARTING WITH ISO 17799.
Josiah et al. Evaluation of roles of auditors in the fraud detection and investigation in Nigerian industries
CN112862338A (en) Enterprise credit report acquisition method and related equipment
Nusa Quality of audit system information for internal control effectiveness
CN117314424B (en) Block chain transaction system and method for big financial data
Calderon et al. Comparing the cybersecurity risk disclosures of US and foreign firms
CN111784213A (en) Investment management based cloud platform and investment management method
CN116416075A (en) Connection information acquisition system in database security audit
Siddharta Independent auditors’ responsibilities for violations of anti-bribery provisions under the US Foreign Corrupt Practices Act: Auditing for bribes
Lutui et al. The relevance of a good internal control system in a computerised accounting information system
Ariwa et al. Green communication and corporate sustainability of computer aided audit techniques and fraud detection
Dombora Integrated incident management model for data privacy and information security
Bashir et al. A Risk Score Analysis Related to Money Laundering in Financial Institutions Across Nations
Moore et al. Keeping an eye on Sarbanes-Oxley
Tum Continuous Audit: From the concept towards the implementation
SK352011A3 (en) System for automated data checking documents, the authenticity of documents and electronic archiving.
Sullivan Why the auditing standards on evaluating internal control needed to be replaced
Ali et al. A Proposed Auditing Program for Auditing Cryptocurrencies Transactions–Analytical Study
Chidgey Internal Audit and Internal Control
BANA Impact of Audit Trails on the Financial Audit of Nigerian Banking Sector
Bossa et al. Blockchain: Technology as a Tool for Tax Information Exchange or an Instrument Threatening the Taxpayer’s Privacy?
Korauš et al. Fraud Red Flags and the Procedure of Implementation of Forensic Audit
Bulat et al. Assessing the risk of fraud in the internal audit mission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination