|
With the Enforcement Rules of the Personal Information Protection Act announced by Republic of China in October 2012, buinesses, health carefacilities, education facilities, educational facilities, or departments of government focus more on the personal information protection. Furthermore, among those organizations, Relational Database becomes the main place to store core data and personal information. So, to prevent those database and personal information from being breached and illegally used, Database Active Monitor, DAM, is becoming one of main means to keep database information safe. Currently, because networking and application systems of organizations are different, several sorts of structures are used to accomplish system implementation. This study discusses the following four models: 1.Sniffing mode, 2.Agent mode, 3.Inline mode, 4.Gateway mode. Meanwhile, for businesses and organization to refer, when they are adopting DAM system, the analysis and comparison of various system are conducted here, such as IBM, IMPERVA, Warevalley. Finally, this study reveals how to use DAM appropriately according to the requirement of Taiwanese Personal Information Protection; in this way, following steps are adopted to achieve that: policy, report, alert and block.
|