Auditing and Monitoring User Activities in Database Systems
Which of the following operations is considered a DDL (Data Definition Language) operation that should be audited to prevent unauthorized schema changes?
In the context of database security, what does Fine-Grained Auditing (FGA) allow administrators to do?
Why is it crucial to log failed database operations (e.g., a user attempting an unauthorized UPDATE) in an audit trail?