From the course: Complete Guide to Advanced SQL Server

Unlock the full course today

Join today to access over 24,400 courses taught by industry experts.

Detect unauthorized data modifications

Detect unauthorized data modifications - SQL Server Tutorial

From the course: Complete Guide to Advanced SQL Server

Detect unauthorized data modifications

I have a confession to make. I've spent the last few minutes hacking my own database. Since I have full access to my Windows file system, I can get to the SQL Server data and log files. Here are the two files that store everything about the KinetEco database that we've been working with. These are the data and the log files. Because I can access the actual files outside of SQL Server, these files are vulnerable to malicious attacks and alterations. And that's exactly what I've just done. I've gone in and changed some of the data outside of the authentication protections that SQL Server would normally enforce. Now, I'm not going to go into detail about exactly what I did or how I did it because, well, frankly, it's just not a very honest thing to know how to do, but it's exactly the kind of hack that could affect your own database if someone malicious were to gain access. So let's jump into Management Studio and see what's going on and how the ledger is going to help us deal with the…

Contents