Vi ste ovdje
Overview/Description
A basic security requirement is that you must know your users. You must identify them before you can determine their privileges and access rights, so that you can audit their actions on the data. This course covers creating and auditing database authenticated users and operating-system-authenticated users. It explores authenticating users with passwords or the operating system, and protecting passwords and database link passwords. In addition, this course describes strong authentication that uses certificates, Kerberos, and remote authentication dial-in service (RADIUS),...
Overview/Description
Monitoring or auditing should be an integral part of your security procedures. Oracle Database 11g includes auditing tools for database, user, and fine-grained auditing. This course explores how to implement basic database auditing, privileged user auditing, DML and DDL auditing, and how to send audit records to the operating system files. Implementing fine-grained auditing (FGA), maintaining FGA policies, implementing an FGA audit event handler, and reading FGA audit events from the FGA audit trail are also covered.
Target Audience
Database administrators, security...
Overview/Description
Oracle Database server is highly secure, but to fully maximize the security features offered, the database must be well protected as well. This course explores how to configure Oracle Database 11g in a secure manner by adhering to industry standard best security practices for operational database deployments. It covers applying the principle of least privilege to the database, locking and expiring default user accounts, changing default user passwords, creating strong passwords, enforcing password management, and protecting the data dictionary.
Target Audience
Database...
Overview/Description
All encryption has two parts: an algorithm, which is a procedure or a method of manipulating data, and a key or a secret that allows data to be decrypted. This course discusses the issues and challenges of encryption and describes key management solutions. It also describes the encryption options available with Oracle Database 11g. Using DBMS_CRYPTO to generate random encryption keys and encrypting and decrypting table columns are also covered.
Target Audience
Database administrators, security administrators, security compliance auditors, security compliance professionals...
Overview/Description
Enterprise User Security addresses the user, the administrative, and the security challenges by centralizing storage and management of user-related information in a Lightweight Directory Access Protocol-compliant directory service. This course describes the basic components of Enterprise User Security. It shows the architecture of this feature and describes the installation process. The components required to create and manage an enterprise user are discussed. In addition, the course explains the techniques for using the enterprise user in the context of the database...
Overview/Description
There is no single best architecture for accommodating Internet requests requiring access to corporate intranets. Instead, trade-offs must be made between two competing goals â security of the intranet against an Internet attack and ease of access to services by both Internet and intranet clients. This course describes how firewalls are used to restrict network access and the guidelines for positioning servers within firewalls. It also explores how to configure Oracle Connection Manager to accept or reject connection requests and log connection events, and how to read...
Overview/Description
Every business should identify security threats and concerns and develop policies to protect itself. Maintaining the integrity of important data, and protecting data by controlling access to it are also key steps in business security. This course describes business security requirements and defines least privilege, authorization, and authentication. It also covers security policies, the concept of in-depth security, and applies these concepts to prevent SQL injection. Maintaining data integrity, protecting data, and controlling data access are also covered.
Target...
Overview/Description
Oracle Label Security is a powerful tool for classifying data and mediating access to data based on its classification. It provides an easy-to-implement row-level security solution and is built on the fine-grained access control technology of the virtual private database (VPD). This course describes Oracle Label Security, including label concepts and access mediation, as well as when to use Oracle Label Security. It also explores creating policies, defining data labels, applying policies to tables, and setting up user authorizations. Data masking is the process of...
Overview/Description
When considering Oracle security, you must also consider the security of the listener, which is the gateway to the network and the network itself. This course describes the items on the client, listener, and network security checklists. It demonstrates how to secure administration of the network, restrict access by IP address, and encrypt network traffic. Restricting the privileges of the listener, administering the listener securely, and monitoring listener activity are also covered.
Target Audience
Database administrators, security administrators, security compliance...
Overview/Description
Authorization is the process that determines the privileges that the user is allowed to exercise. In the Oracle database, authorization is determined by the grant of system and object privileges. This course covers implementing roles, enterprise roles, and the securing of objects through procedures. It also describes how secure application roles work and how to manage roles and users by using secure application roles. An application context is a memory container with read-only attributes, which can be used in your application. How an application context is used, the...
- 1 od 2
- ››