Develop and Execute a Fail-Safe Security Plan for Your Oracle System
Opening mission-critical systems to partners and customers over the Internet poses new challenges to traditional measures of enterprise security. Oracle Security Handbook presents tested techniques and proven strategies for securing an Oracle environment -- from the operating system to the database to the network. Youll get step-by-step details on developing a rock-solid security plan and concrete examples of how to implement security using Oracles built-in tools. The book also explains how to hacker-proof, audit, and troubleshoot your entire system. Officially endorsed by Oracle Corporation, this expert resource even delves into the details of Oracles own security implementations.
- Determine database vulnerability and the necessary steps to protect your
system against attacks
- Implement operating-system security measures for UNIX and Microsoft
Windows NT/2000
- Integrate authentication of database accounts with operating-system
security
- Take advantage of the various password management features available in
the Oracle database
- Use and control system and object privileges, roles, and views
- Implement location transparency using database links for server-to-server
connections
- Design and implement secure applications using Virtual Private Database
(VPD) and Oracle Label Security options
- Ensure data security over a network using the Oracle Advanced Security
tool
- Construct a sound firewall to maintain network integrity
- Configure security into an Oracle9i Application Server Portal system
- Hacker-proof your system by anticipating an attackers methods
Contents
PART I Beginnings
1 Security
Architecture
2 Oracle Security
Implementation
3 Planning Your Security
PART II Securing the Operating System
4 Database
Security on Unix Operating Systems
5 Oracle and Windows
NT/2000 Security
6 Operating System
Authentication
PART III Securing the Oracle
Database
7 Passwords and Users
8
Privileges, Grants, Roles, and Views
9 Oracle and
Database Links
10 Security and Developer
Tools
PART IV Secure Network
Communications
11 Network Integrity, Authentication, and
Encryption
12 Oracle Security
Options
13 Firewalls and Oracle
14
Apache HTTP Server Security
15 Oracle Portal Security
Management
PART V Hackers and
Troubleshooting
16 Implementing
Auditing
17 Hacker-Proofing Your
Database
A Glossary
B Security
Risk Assessment Checklists
C Steps to Secure Your
System
D System Privileges and Audit
Options
E Oracle9i Security
Features