Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment

Team-Fly    

  
Oracle Security

By William Heney, Marlene Theriault

Table of Contents

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

packages 

packets 

parameters, INIT.ORA 

parameters, table 

PASSWORD command 

PASSWORD_GRACE_TIME parameter 

PASSWORD_LIFE_TIME parameter 

PASSWORD_LOCK_TIME parameter 

PASSWORD_REUSE_MAX parameter 

PASSWORD_REUSE_TIME parameter 

PASSWORD_VERIFY_FUNCTION parameter 

passwords  2nd  3rd  4th 

    aging and expiring  2nd 

    built-in user accounts 

        dbsnmp user 

        demo user 

        scott user 

        sys user  2nd 

        system user 

    built-in-user accounts

        po8 user 

    changing  2nd 

    composition and complexity features 

    data encryption and 

    database connections without 

    files for 

    guesses as unsuccessful logons  

    for network listeners 

    OSS accounts 

    password files 

    profile parameters for 

    for roles  2nd 

    standards for 

    swapping 

performance  [See also disk storage; memory]

    auditing drain on  2nd 

    auditing to measure 

    client/server architecture 

    Oracle Performance Packs 

    Performance Management events 

    segmenting application processing 

    trigger speed 

    views and 

period of validity, certificate 

permissions, file 

    configuration file 

    control files 

    EXECUTE privilege 

    initialization file 

    redo log files 

physical components of Oracle systems 

PL/SQL commands, disabling 

PL/SQL source code wrapper 

plaintext 

plans, security 

    auditing  2nd 

        process of auditing 

        purging audit data 

        storing audit information 

        types of auditing 

    backup and recovery 

    defined 

     employees  

    index and checklist for 

    involving users in 

    key components (list) 

    managing 

    need for 

    OSS for  [See OSS]

    passwords 

    reviewing 

    roles 

    user accounts 

    usernames 

    views 

platforms 

po8 user account 

policies, security 

    defined 

    enforcing 

    involving users in 

    need for 

pre-employment tracking 

primary keys, updateable views and 

privacy  2nd 

private keys 

private synonyms 

PRIVATE_SGA parameter 

privileges  2nd  [See also roles]3rd 

     administrator-level , auditing 

    audit tables 

    auditing  2nd  3rd  4th 

    credit card system (example) 

    determining which are granted 

    for employees 

    granted to roles 

        ROLE_SYS_PRIVS view 

        ROLE_TAB_PRIVS view 

    listing all granted

        DBA_SYS_PRIVS view 

        DBA_TAB_PRIVS view 

    procedures 

    roles and  [See roles]

    SQL, disabling 

    synonyms 

    system vs. object privileges 

    table ownership 

procedures  2nd 

    executing 

    ownership and privileges 

procedures, security

    auditing 

    backup and recovery 

    defined 

    involving users in 

processing, segmenting 

product profiles  2nd  [See also profiles]3rd  4th  5th 

PRODUCT_PRIVS view 

PRODUCT_PROFILE table 

profile$ table 

profiles  2nd  3rd 

    DBA_PROFILES view 

    product profiles  2nd  3rd  4th 

    system resource profiles  2nd  3rd  4th  5th 

        DEFAULT profile 

profname$ table 

programs  2nd  3rd  [See also triggers]

promoted employees 

public keys 

public user account ( group )  2nd  3rd 

    location transparency  2nd 

    synonyms 

PUPBLD.SQL script 

purging audit information 


Team-Fly    
Top

Категории