Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment

Team-Fly    

  
Oracle Security

By William Heney, Marlene Theriault

Table of Contents

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

damage from failed security 

data access  [See authorization]

Data Definition Language (DDL) 

data dictionary  2nd 

    auditing 

    SQL.BSQ file 

    views of 

        passwords and 

        security- related  

data encryption  [See encryption]

Data Manager utility (OEM)  2nd 

Data Manipulation Language (DML) 

data storage  [See disk storage]

database administration toolkit (OEM)  2nd 

database objects  2nd 

    auditing  2nd 

    backing up logical database  2nd 

    in data dictionary 

    defined 

    list of 

    location transparency  2nd 

databases

    access to data  [See authorization]

    administration  [See administration]

    auditing  [See auditing]

    backing up  [See backup and recovery]

    connecting to 

        auditing connects/disconnects 

        constant-state vs. stateless 

        direct server connection 

        remotely 

        single sign-on  2nd 

        without a password 

    control files  2nd 

    creating

        MAXDATAFILES parameter 

        redo log files 

        SQL.BSQ file and 

    failure  [See backup and recovery]

    files of  [See system files]

    OEM repository 

    OSS repository  2nd  3rd  4th 

    profiles  [See profiles]

    segmenting authority in (example) 

    starting 

    startup/shutdown  2nd 

    structure modifications, auditing 

    Trusted Oracle, accessing 

datafiles, tablespace 

    backing up 

DB_NAME parameter (CONFIG.ORA) 

DBA role  2nd  3rd 

    auditing 

    po8 user account 

DBA toolkit (OEM)  2nd 

DBA_AUDIT_EXISTS view 

DBA_AUDIT_OBJECT view 

DBA_AUDIT_SESSION view 

DBA_AUDIT_STATEMENT view 

DBA_AUDIT_TRAIL view  2nd 

DBA_OBJ_AUDIT_OPTS view 

DBA_PRIV_AUDIT_OPTS view 

DBA_PROFILES view  2nd 

DBA_ROLE_PRIVS view  2nd 

DBA_ROLES view  2nd 

DBA_STMT_AUDIT_OPTS view 

DBA_SYS_PRIVS view  2nd 

DBA_TAB_PRIVS view  2nd 

DBA_USERS view  2nd 

DBAs  [See administration]

dbsnmp user account 

DDL (Data Definition Language) 

decryption  2nd  [See also encryption]

default

    auditing 

    auditing privileges 

    roles  2nd 

        list of 

    user accounts  2nd 

DEFAULT profile parameter 

defrole$ table 

deinstalling Oracle products 

DELETE privilege  2nd 

DELETE_CATALOG_ROLE role  2nd 

deleting

    accidental/ deliberate data loss 

    after-delete trigger (example)  2nd 

    audit information 

    CA identities 

    Oracle software 

    OSS repository  2nd 

    tracking deletions 

demo user account 

demoted employees  

DES cryptographic algorithms  2nd 

detached processes 

DICTIONARY view 

    auditing information in 

digital signatures  2nd 

direct database server connections 

disconnecting  [See connecting to databases]

disgruntled employees 

disk storage

    audit information  2nd  3rd  4th 

    capturing table data (example) 

        after-delete trigger  2nd 

        after-update trigger  2nd 

         before-insert trigger  2nd 

        scripts to create triggers 

    control files 

    cookies  2nd 

    creating tables 

    fragmentation 

        SYS.AUD$ table  2nd  3rd 

    IP addresses 

    loss of data 

    OEM repository 

    Oracle Storage Manager  2nd 

    password files 

    quotas 

    Space Management events 

    SQL.BSQ and CATALOG.SQL files 

    tablespace datafiles 

        backing up 

dismissed employees 

distinguished names (DNs) 

distributed processing 

distributing Oracle software 

distribution files 

DML (Data Manipulation Language) 

DNs (distinguished names) 

downsizing, security standards and 

dynamic HTML applications 


Team-Fly    
Top

Категории