Cargando…

Oracle database 12c security /

David Knox, the most well-respected and notable Oracle security expert, provides the trusted advice and latest best practices for comprehensive Oracle Database security.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Gaetjen, Scott (Autor), Knox, David (David Christopher) (Autor), Maroulis, William (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • About the Author
  • Contents
  • Foreword
  • Acknowledgments
  • Introduction
  • Part I: Essential Database Security
  • Chapter 1: Security for Today's World
  • The Security Landscape
  • Base Assumptions
  • Database Security Today
  • Evolving Security Technologies
  • Security Motivators
  • Sensitive Data Categorization
  • Principles
  • Summary
  • Chapter 2: Essential Elements of User Security
  • Understanding Identification and Authentication
  • Identification Methods
  • Authentication
  • Understanding Database Account Types
  • Database Account Types in Oracle Database 12c Multitenant Architecture
  • Privileged Database Account Management in Oracle Database 12c
  • Administrative Privileges for Separation of Duty
  • Methods for Privileged Database Account Management
  • Account Management in Multitenant Oracle Database 12c
  • Creating Common Database Accounts
  • Managing Accounts in a Pluggable Database
  • Managing Database Account Passwords and Profiles
  • Managing Passwords for Local Database Accounts
  • Managing Database Account Profiles
  • Summary
  • Chapter 3: Connection Pools and Enterprise Users
  • External Identification and Authentication Challenges
  • Connection Challenges
  • Performance
  • Connection Pools
  • Security Risks
  • External Identification and Authentication in Oracle Database 12c
  • Oracle Proxy Authentication
  • Oracle Enterprise User Security
  • Oracle Kerberos Authentication
  • Oracle RADIUS Authentication
  • Summary
  • Chapter 4: Foundational Elements for a Secure Database
  • Access Control, Authorization, and Privilege
  • Access Control
  • Authorization
  • Privilege
  • Object Privileges
  • Column Privileges
  • Synonyms
  • System and Object Privileges Together
  • Privilege Conveyance and Retraction
  • Roles
  • Role and Privilege Immediacy
  • Roles and Container Databases
  • Public and Default Database Roles
  • Role Hierarchies
  • Object Privileges Through Roles and PL/SQL
  • Selective Privilege Enablement
  • Selective Privilege Use Cases
  • Password-Protected Roles
  • Password-Protected Role Example
  • Password-Protected Roles and Proxy Authentication
  • Challenges to Securing the Password
  • Secure Application Roles
  • Secure Application Role Example
  • Global Roles and Enterprise Roles
  • Creating and Assigning Global and Enterprise Roles
  • Combining Standard and Global Roles
  • Using Roles Wisely
  • Too Many Roles
  • Naming
  • Dependencies
  • Summary
  • Chapter 5: Foundational Elements of Database Application Security
  • Application Context
  • Default Application Context (USERENV)
  • Auditing with USERENV
  • Database Session-Based Application Context
  • Creating a Database Session-Based Application Context
  • Setting Context Attributes and Values
  • Applying the Application Context to Security
  • Secure Use
  • Common Mistakes
  • Global Application Context
  • GAC Uses
  • GAC Example
  • Global Context Memory Usage