Book description
Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases. Oracle security has many facets:
Establishing an organization's security policy and plan
Protecting system files and passwords
Controlling access to database objects (tables, views, rows, columns, etc.)
Building appropriate user profiles, roles, and privileges
Monitoring system access via audit trails
Oracle and Security
Oracle System Files
Oracle Database Objects
The Oracle Data Dictionary
Default Roles and User Accounts
Profiles, Passwords, and Synonyms
Developing a Database Security Plan
Installing and Starting Oracle
Developing a Simple Security Application
Developing an Audit Plan
Developing a Sample Audit Application
Backing Up and Recovering a Database
Using the Oracle Enterprise Manager
Maintaining User Accounts
Using the Oracle Security Server
Using the Internet and the Web
Using Extra-Cost Options
Oracle Security describes how these basic database security features are implemented and provides many practical strategies for securing Oracle systems and databases. It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies. A table of contents follows: Preface Part I: Security in an Oracle System
Part II: Implementing Security
Part III: Enhanced Oracle Security
Appendix A. References
Table of contents
-
Oracle Security
- Dedication
- Preface
-
I. Security in an oracle System
- 1. Oracle and Security
- 2. Oracle System Files
- 3. Oracle Database Objects
- 4. The Oracle Data Dictionary
- 5. Oracle Default Roles and User Accounts
- 6. Profiles, Passwords, and Synonyms
-
II. Implementing Security
- 7. Developing a Database Security Plan
- 8. Installing and Starting Oracle
- 9. Developing a Simple Security Application
- 10. Developing an Audit Plan
-
11. Developing a Sample Audit Application
-
About the Audit Trail Application
- A Few Limitations
- Tracking Inserts
- The First Sequence Creation Script (SEQ-RID)
- The First Trigger Creation Script (Before-Insert)
- Tracking Updates and Deletions
- The Three Table Creation Scripts
- The Second Sequence Creation Script (SEQ_AUDIT)
- The Second Trigger Creation Script (After-Update)
- The Third Trigger Creation Script (After-Delete)
- The Package and Procedure Creation Scripts
- About Performance and Storage
- Using the Audit Data in Reports
- SQL Scripts to Generate Scripts
-
About the Audit Trail Application
- 12. Backing Up and Recovering the Database
- 13. Using the Oracle Enterprise Manager
- 14. Maintaining User Accounts
-
III. Enhanced Oracle Security
- 15. Using the Oracle Security Server
- 16. Using the Internet and the Web
- 17. Using Extra-Cost Options
- A. References
- Index
- Colophon
Product information
- Title: Oracle Security
- Author(s):
- Release date: October 1998
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781565924505
You might also like
book
Practical Oracle Security
This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. …
book
Oracle Database 12c Security
Best Practices for Comprehensive Oracle Database Security Written by renowned experts from Oracle's National Security Group, …
book
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting …
video
Oracle 11g
In this Oracle 11g video based training course, through the expert tutelage of Lewis Cunningham, you …