Chapter 2: Securing The Database

Overview

This chapter focuses on the steps you’ll use to help secure your OracleDatabases. You’ll see how applying the best practice principles (explored in Chapter 1) to an Oracle database will help to further secure it.

This chapter looks at securing database schemas by limiting their privileges, providing good password support, restricting access using multiple defenses, and securing the network channels to and from the database. These steps represent many of the best practices used by organizations today. These are the actions you should also be taking to configure and operate a secure Oracle Database.

The remaining chapters of this book discuss how to effectively apply technology features and capabilities to the task of building secure database applications. For this to happen successfully, you’ll first have to apply the lessons taught in this chapter. You’ll need to take certain actions and practice certain behaviors to ensure a good security foundation.



Effective Oracle Database 10g Security by Design
Effective Oracle Database 10g Security by Design
ISBN: 0072231300
EAN: 2147483647
Year: 2003
Pages: 111

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net