138 - A

Team-Fly    

  
Oracle Security
By William Heney, Marlene Theriault
Table of Contents


[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

access  [See authorization]
accounts, user  
    authentication  [See authentication]
    default  2nd  3rd 
    identified externally 
    locking  2nd 
    maintaining 
    operating system and 
    OPS$ accounts 
    privileges for creating 
     requests for, handling 
    security user account 
    standards for 
    types of 
administration
    accounts for 
    auditing administrator-level connections 
    backup levels 
    communicating with other managers 
    DBA toolkit (OEM)  2nd 
    detecting table name guesses 
    disabling SQL privileges 
    Job Scheduler (OEM) 
    managing the security plan 
    monitoring database events 
    purging audit data 
    remote 
    user account maintenance 
Advanced Networking Option (ANO)  2nd  3rd 
after-delete trigger (example)  2nd 
after-update trigger (example)  2nd 
aging passwords  2nd 
alert log 
algorithms, cryptographic 
aliases  [See synonyms]
ALL privilege 
ALL_DEF-AUDIT_OPTS view 
ALTER privilege 
ALTER SESSION command 
ALTER SYSTEM command 
ALTER TABLESPACE commands 
ANO (Advanced Networking Option)  2nd  3rd 
ANY qualifier 
application manager account 
Application Server  [See OAS]
applications
    account maintenance (example) 
    audit trail (example)  2nd 
        reporting audit data 
        tables for 
        tracking inserts   2nd 
        tracking updates and deletions 
    credit card system (example) 
    dynamic HTML for 
    segmenting processing 
archive log files 
archivelog mode 
archiving audit data 
associative tables 
attacks  [See threats]
AUD$ table 
    purging 
    views 
AUDIT command 
AUDIT privilege 
AUDIT_COLUMN table (example) 
AUDIT_DELETE table (example) 
AUDIT_FILE_DEST parameter 
AUDIT_ROW table (example)  2nd 
AUDIT_TRAIL parameter  2nd 
auditing 
    audit trail application (example)  2nd 
        reporting audit data 
        tables for 
        tracking inserts  2nd 
        tracking updates and deletions 
    data dictionary  2nd 
    default 
    DICTIONARY view information 
    initialization file 
    list of actions/options 
    performance audits  
    performance drain from  2nd 
    plan and procedure 
    privileges, default 
    purging audit data 
    reasons for 
    storing audit information 
    tracking users 
    triggers for 
    types of 
    views  2nd 
        SYS.AUD$ table 
authentication  2nd  3rd 
    OPS$ accounts 
    ORAPWD/ORAPWD80 utility 
    OSDBA, OSOPER privileges 
    OSS Authentication Adapter 
authorization  [See also authentication]
    configuration file access 
    control files access 
    controlling from operating system 
    credit card system example 
    data access  2nd 
    database connections  2nd 
        auditing 
        direct server connection 
        without a password 
    DBA role, handling 
    disabling SQL privileges 
    Enterprise Authorization role 
    files  [See permissions, file]
    initialization file access 
    OAS and 
    OEM console 
    Oracle system access 
    OSS repository 
    public user account  2nd 
    redo log files access 
     role-object access matrix (example) 
    roles  [See roles]
    segmenting in database (example) 
    Server Authorization role 
    table ownership 
    Trusted Oracle databases 
    user resource limits  2nd 
AUTOEXTEND parameter 
automatic job scheduling 


Team-Fly    
Top


Oracle Security
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
ISBN: 0072133252
EAN: 2147483647
Year: 1998
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net