What This Book Is
This book is intended to help you understand and implement security within and for your Oracle database systems. Although we touch on many products and strategies, our main goal is to provide you with a clear understanding of the basic tools available with the standard Oracle product delivery.
This book is divided into three parts :
This part of the book introduces security in an Oracle system and outlines the main files, database objects, and Oracle security concepts you need to understand before attempting to adopt the security strategies presented in this book.
Chapter 1, outlines the threats to your system and database, introduces the various levels of security in an Oracle system, and briefly discusses the concepts and products that the book will explore.
Chapter 2, introduces the physical operating system files that are particularly important to your system's security.
Chapter 3, introduces the various database objects that help implement database securityfor example, tables, triggers, roles, and profiles.
Chapter 4, introduces the data dictionary and discusses its relevance to database security.
Chapter 5, describes the roles and user accounts Oracle creates automatically when the database is initialized , and explains why they are important to security.
Chapter 6, discusses how you can use Oracle's user profile, password, and synonym features to secure your system; these features include password expiration times, account locking for passwords, and account "hiding" for synonyms.
This part of the book describes the specific steps we recommend to make your Oracle system and database more secure. It includes a number of sample applications you might want to adapt for your own organization's use.
Chapter 7, discusses the importance of creating policies and a security plan as a first step in securing your system and database.
Chapter 8, describes what you need to do to install and start Oracle databases and to begin to implement securityfor example, determine the appropriate system-level approach for accessing the database.
Chapter 9, provides a basic example of a security application you may wish to adapt for your own environment.
Chapter 10, describes auditing in an Oracle system and discusses the choices you need to make about when and how to audit events.
Chapter 11, provides a simple but effective audit trail application you may wish to build upon.
Chapter 12, discusses the available types of backup and recovery options from a security perspective.
Chapter 13, describes the use of the OEM, a basic GUI toolkit provided by Oracle to simplify many aspects of database administration, including security management.
Chapter 14, provides a sample application you may wish to adapt for maintaining user accounts within your own system.
This part of the book describes some types of security that might be appropriate in certain types of environments.
Chapter 15, discusses the use of the OSS (supplied with the basic Oracle RDBMS), which uses encryption and certificates of authority to enable more secure access to your data.
Chapter 16, suggests a number of strategies for protecting your site from the risks posed by Internet and Web connections.
Chapter 17, looks briefly at several extra-cost Oracle products that you may wish to purchase for enhanced securityTrusted Oracle, the Advanced Networking Option, and the Oracle Application Server.
Appendix A, provides a list of additional books and online resources.