Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment

Team-Fly    

  
Oracle Security

By William Heney, Marlene Theriault

Table of Contents

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

UFI ( User Friendly Interface) 

UNIX systems

    CONNECT INTERNAL command 

    EBU (Enterprise Backup Utility)  2nd 

    file-level interaction protection 

     group membership 

    SQL.BSQ, CATALOG.SQL file locations 

    swapping passwords 

    trusted shells  

UNLIMITED profile parameter 

UNLIMITED tablespace quota  2nd 

unlocking user accounts 

updating

    capturing table data (example) 

        after-update trigger  2nd 

         before-insert trigger  2nd 

    data dictionary 

    tracking updates 

    UPDATE privilege  2nd 

    views 

Usenet newsgroups as resources  2nd 

user groups, Oracle 

user$ table 

User_astatus_map table 

USER_AUDIT_OBJECT view 

USER_AUDIT_SESSION view 

USER_AUDIT_STATEMENT view 

USER_AUDIT_TRAIL view 

USER_OBJ_AUDIT_OPTS view 

USER_PRIVS view 

USER_PROFILE table 

USER_ROLE_PRIVS view 

USER_TABLES view 

users  2nd 

    account creation privileges 

    account standards 

    auditing to detect intruders  2nd 

    authenticating  [See authentication]

    broadcasting message to 

    checking on 

    classes of 

    default accounts  2nd  3rd 

    determining privileges of 

     employees , standards for 

    global, OSS and 

    granting/defining roles, script for 

    groups  [See roles]

    hiding tables and owner from (example) 

    identified externally accounts 

    impersonation 

    information on (DBA_USERS) 

    involving in network security 

    locking accounts  2nd 

    maintaining user accounts 

    operating system accounts 

    OPS$ accounts 

    oracle_security_service(_admin) 

    oracle_security_service, oracle_security_admin 

    passwords  [See passwords]

    private information about  2nd 

    privileges  [See authorization privileges]

    profiles  [See system resource profiles]

    querying 

     requests for accounts, handling 

    resource limits for  2nd 

    roles  [See roles]

    security user account 

    segmenting database authority (example) 

    state of, documenting 

    tracking 

    types of accounts 

    username selection  2nd 

UTL_FILE functions 

UTLPWDMG.SQL script 


Team-Fly    
Top

Категории