- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Database Activity Monitoring Scenario
Learn about the Data Access Abuse Database Activity Monitoring scenario.
The Database Activity Monitoring scenario describes when someone accesses database records to find customer information, medical records, or other sensitive corporate data. This scenario indicates that they're gathering or hoarding the data and is eventually going to leak it.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Database Activity Monitoring scenario falls under the Data Access Abuse use case.