![]() | |
Team-Fly ![]() | ![]() ![]() |
![]() | Oracle Security By William Heney, Marlene Theriault |
Table of Contents | |
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] access [See authorization] accounts, user authentication [See authentication] default 2nd 3rd identified externally locking 2nd maintaining operating system and OPS$ accounts privileges for creating requests for, handling security user account standards for types of administration accounts for auditing administrator-level connections backup levels communicating with other managers DBA toolkit (OEM) 2nd detecting table name guesses disabling SQL privileges Job Scheduler (OEM) managing the security plan monitoring database events purging audit data remote user account maintenance Advanced Networking Option (ANO) 2nd 3rd after-delete trigger (example) 2nd after-update trigger (example) 2nd aging passwords 2nd alert log algorithms, cryptographic aliases [See synonyms] ALL privilege ALL_DEF-AUDIT_OPTS view ALTER privilege ALTER SESSION command ALTER SYSTEM command ALTER TABLESPACE commands ANO (Advanced Networking Option) 2nd 3rd ANY qualifier application manager account Application Server [See OAS] applications account maintenance (example) audit trail (example) 2nd reporting audit data tables for tracking inserts 2nd tracking updates and deletions credit card system (example) dynamic HTML for segmenting processing archive log files archivelog mode archiving audit data associative tables attacks [See threats] AUD$ table purging views AUDIT command AUDIT privilege AUDIT_COLUMN table (example) AUDIT_DELETE table (example) AUDIT_FILE_DEST parameter AUDIT_ROW table (example) 2nd AUDIT_TRAIL parameter 2nd auditing audit trail application (example) 2nd reporting audit data tables for tracking inserts 2nd tracking updates and deletions data dictionary 2nd default DICTIONARY view information initialization file list of actions/options performance audits performance drain from 2nd plan and procedure privileges, default purging audit data reasons for storing audit information tracking users triggers for types of views 2nd SYS.AUD$ table authentication 2nd 3rd OPS$ accounts ORAPWD/ORAPWD80 utility OSDBA, OSOPER privileges OSS Authentication Adapter authorization [See also authentication] configuration file access control files access controlling from operating system credit card system example data access 2nd database connections 2nd auditing direct server connection without a password DBA role, handling disabling SQL privileges Enterprise Authorization role files [See permissions, file] initialization file access OAS and OEM console Oracle system access OSS repository public user account 2nd redo log files access role-object access matrix (example) roles [See roles] segmenting in database (example) Server Authorization role table ownership Trusted Oracle databases user resource limits 2nd AUTOEXTEND parameter automatic job scheduling |
![]() | |
Team-Fly ![]() | ![]() ![]() |
Top |