Team-Fly |
Oracle Security By William Heney, Marlene Theriault | |
Table of Contents | |
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] UFI ( User Friendly Interface) UNIX systems CONNECT INTERNAL command EBU (Enterprise Backup Utility) 2nd file-level interaction protection group membership SQL.BSQ, CATALOG.SQL file locations swapping passwords trusted shells UNLIMITED profile parameter UNLIMITED tablespace quota 2nd unlocking user accounts updating capturing table data (example) after-update trigger 2nd before-insert trigger 2nd data dictionary tracking updates UPDATE privilege 2nd views Usenet newsgroups as resources 2nd user groups, Oracle user$ table User_astatus_map table USER_AUDIT_OBJECT view USER_AUDIT_SESSION view USER_AUDIT_STATEMENT view USER_AUDIT_TRAIL view USER_OBJ_AUDIT_OPTS view USER_PRIVS view USER_PROFILE table USER_ROLE_PRIVS view USER_TABLES view users 2nd account creation privileges account standards auditing to detect intruders 2nd authenticating [See authentication] broadcasting message to checking on classes of default accounts 2nd 3rd determining privileges of employees , standards for global, OSS and granting/defining roles, script for groups [See roles] hiding tables and owner from (example) identified externally accounts impersonation information on (DBA_USERS) involving in network security locking accounts 2nd maintaining user accounts operating system accounts OPS$ accounts oracle_security_service(_admin) oracle_security_service, oracle_security_admin passwords [See passwords] private information about 2nd privileges [See authorization privileges] profiles [See system resource profiles] querying requests for accounts, handling resource limits for 2nd roles [See roles] security user account segmenting database authority (example) state of, documenting tracking types of accounts username selection 2nd UTL_FILE functions UTLPWDMG.SQL script |
Team-Fly |
Top |