Oracle database 12c security /
David Knox, the most well-respected and notable Oracle security expert, provides the trusted advice and latest best practices for comprehensive Oracle Database security.
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
[2015]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- About the Author
- Contents
- Foreword
- Acknowledgments
- Introduction
- Part I: Essential Database Security
- Chapter 1: Security for Today's World
- The Security Landscape
- Base Assumptions
- Database Security Today
- Evolving Security Technologies
- Security Motivators
- Sensitive Data Categorization
- Principles
- Summary
- Chapter 2: Essential Elements of User Security
- Understanding Identification and Authentication
- Identification Methods
- Authentication
- Understanding Database Account Types
- Database Account Types in Oracle Database 12c Multitenant Architecture
- Privileged Database Account Management in Oracle Database 12c
- Administrative Privileges for Separation of Duty
- Methods for Privileged Database Account Management
- Account Management in Multitenant Oracle Database 12c
- Creating Common Database Accounts
- Managing Accounts in a Pluggable Database
- Managing Database Account Passwords and Profiles
- Managing Passwords for Local Database Accounts
- Managing Database Account Profiles
- Summary
- Chapter 3: Connection Pools and Enterprise Users
- External Identification and Authentication Challenges
- Connection Challenges
- Performance
- Connection Pools
- Security Risks
- External Identification and Authentication in Oracle Database 12c
- Oracle Proxy Authentication
- Oracle Enterprise User Security
- Oracle Kerberos Authentication
- Oracle RADIUS Authentication
- Summary
- Chapter 4: Foundational Elements for a Secure Database
- Access Control, Authorization, and Privilege
- Access Control
- Authorization
- Privilege
- Object Privileges
- Column Privileges
- Synonyms
- System and Object Privileges Together
- Privilege Conveyance and Retraction
- Roles
- Role and Privilege Immediacy
- Roles and Container Databases
- Public and Default Database Roles
- Role Hierarchies
- Object Privileges Through Roles and PL/SQL
- Selective Privilege Enablement
- Selective Privilege Use Cases
- Password-Protected Roles
- Password-Protected Role Example
- Password-Protected Roles and Proxy Authentication
- Challenges to Securing the Password
- Secure Application Roles
- Secure Application Role Example
- Global Roles and Enterprise Roles
- Creating and Assigning Global and Enterprise Roles
- Combining Standard and Global Roles
- Using Roles Wisely
- Too Many Roles
- Naming
- Dependencies
- Summary
- Chapter 5: Foundational Elements of Database Application Security
- Application Context
- Default Application Context (USERENV)
- Auditing with USERENV
- Database Session-Based Application Context
- Creating a Database Session-Based Application Context
- Setting Context Attributes and Values
- Applying the Application Context to Security
- Secure Use
- Common Mistakes
- Global Application Context
- GAC Uses
- GAC Example
- Global Context Memory Usage