Team-Fly |
Oracle Security By William Heney, Marlene Theriault | |
Table of Contents | |
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] saving files [See disk storage] scheduling jobs schema 2nd 3rd stored program ownership and Schema Manager utility (OEM) 2nd scott user account security DBA role, handling example of secure application failed [See damage from failed security] government security levels/clearances involving users in OEM for [See OEM] Oracle security model passwords [See passwords] resources for further reading row-level 2nd credit card system (example) synonyms [See synonyms] threats [See threats] tools [See tools for security] views for data dictionary views web-based Security Manager (Java) security manager account Security Manager utility (OEM) 2nd security plans auditing 2nd process of auditing purging audit data storing audit information types of auditing backups [See backup and recovery] defined employees index and checklist for key components (list) managing need for OSS for [See OSS] passwords reviewing roles user accounts usernames views security policies defined enforcing need for security procedures auditing backup [See backup and recovery] defined Security Server [See OSS] security user account segmenting application processing segmenting database authority (example) SELECT commands, triggers and SELECT privilege 2nd SELECT_CATALOG_ROLE role 2nd SEQ_AUDIT script (example) SEQ_RID script (example) Server Authorization role Server Manger Utility (svrmgr) servers, web SESSIONS_PER_USER parameter set protection command (OpenVMS) SET ROLE command, disabling SGA (System Global Area) 2nd shortcuts, auditing SHOW PARAMETERS command shutdown, database auditing automatic single sign-on 2nd size , file [See disk storage] sizing tablespaces SYS.AUD$ table and 2nd unlimited quota 2nd SKEME (Security Exchange Mechanism) protocol sniffers 2nd 3rd 4th snoopers Software Manager utility (OEM) 2nd source code, encrypting [See encryption] Space Management events speed [See performance] spoofers 2nd Spyglass HTTPS listener SQL privileges, disabling SQL Worksheet utility (OEM) 2nd SQL*Net firewalls and installing and configuring Net8 Assistant two- tier architecture and SQL*Plus, automatically running scripts SQL.BSQ file SQLDBA utility SQLNET.ORA file standards [See security plan] starting databases starting Oracle startup control (example) startup, database auditing automatic state, user stateless connections statement-level auditing 2nd status, database [See control files] STORAGE clause (CREATE) 2nd Storage Manager utility (OEM) 2nd stored programs 2nd 3rd [See also triggers] ownership and privileges 2nd storing files [See disk storage] structure modifications, auditing substitution cipher svrmgr utility swapping passwords synonyms 2nd 3rd 4th location transparency 2nd public vs. private reasons to use resolving, ownership and tips for creating sys user account password for SYS.AUD$ table purging views sysauth$ table SYSDBA role 2nd 3rd SYSOPER role 2nd 3rd system files 2nd list of, and descriptions required for SQL*Net System Global Area [See SGA] system_privilege_map table system privileges 2nd [See also privileges] adding to roles auditing 2nd built-in roles CONNECT role DBA role RESOURCE role SYSDBA, SYSOPER roles granted to roles (ROLE_SYS_PRIVS) listing all granted (DBA_SYS_PRIVS) system resource profiles 2nd 3rd [See also profiles]4th 5th 6th DEFAULT profile system tablespace audit data in 2nd system user account OSS repository and |
Team-Fly |
Top |