Auditing


Auditing is normally done for system tuning and performance reasons. However, there are tools that allow you to track the following if you suspect a security problem:

  • SQL statements . You can refine the auditing process to track the statements of just one user .

  • Privileges . An example is the ability to create tables.

  • Schemas . Here the focus is a particular user and all the objects in that user's schema.

These types of auditing actions are usually initiated when a real or potential security breach is suspected. More details can be found in the Oracle documentation. This short section is just meant to let you know that security auditing does exist.



Guerrilla Oracle
Guerrilla Oracle: The Succinct Windows Perspective
ISBN: 0201750775
EAN: 2147483647
Year: 2003
Pages: 84

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net