Oracle 11g anti-hacker's cookbook
This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor looking to secure the Oracle Database or prevent it from being hacked, then this book is fo...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, [Eng.] :
Packt Publishing
2012.
|
Edición: | 1st edition |
Colección: | Quick answers to common problems
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628566406719 |
Tabla de Contenidos:
- Cover; Copyright; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System Security; Introduction; Using Tripwire for file integrity checking; Using immutable files to prevent modifications; Closing vulnerable network ports and services; Using network security kernel tunables to protect your system; Using TCP wrappers to allow and deny remote connections; Enforcing the use of strong passwords and restricting the use of previous passwords; Restricting direct login and su access; Securing ssh login
- Chapter 2:Securing the Network and Data in TransitIntroduction; Hijacking an Oracle connection; Using OAS network encryption for securing data in motion; Using OAS data integrity for securing data in motion; Using OAS SSL network encryption for securing data in motion; Encrypting network communication using IPSEC; Encrypting network communication with stunnel; Encrypting network communication using SSH tunneling; Restricting the fly listener administration using the ADMIN_RESTRICTION_LISTENER; parameter; Securing external program execution (EXTPROC)
- Controlling client connections using TCP.VALIDNODE_CHECKING listenerparameter; Chapter 3:Securing Data at Rest; Introduction; Using block device encryption; Using filesystem encryption with eCryptfs; Using DBMS_CRYPTO for column encryption; Using Transparent Data Encryption for column encryption; Using TDE for tablespace encryption; Using encryption with data pump; Using encryption with RMAN; Chapter 4:Authentication and User Security; Introduction; Performing a security evaluation using Oracle Enterprise Manager; Using an offline Oracle password cracker
- Using user profiles to enforce password policiesUsing secure application roles; How to perform authentication using external password stores; Using SSL authentication; Chapter 5:Beyond Privileges: Oracle Virtual Private Database; Introduction; Using session-based application contexts; Implementing row-level access policies; Using Oracle Enterprise Manager for managing VPD; Implementing column-level access policies; Implementing VPD grouped policies; Granting exemptions from VPD policies; Chapter 6:Beyond Privileges: Oracle Label Security; Introduction; Creating and using label components
- Defining and using compartments and groupsUsing label policy privileges; Using trusted stored units; Chapter 7:Beyond Privileges: Oracle Database Vault; Introduction; Creating and using Oracle Database Vault realms; Creating and using Oracle Vault command rules; Creating and using Oracle Database Vault rulesets; Creating and using Oracle Database Vault factors; Creating and using Oracle Database Vault reports; Chapter 8:Tracking and Analysis: Database Auditing; Introduction; Determining how and where to generate audit information; Auditing sessions; Auditing statements; Auditing objects
- Auditing privileges