Limit search to available items
Book Cover
E-book
Author Wright, Paul M. (Computer scientist), author.

Title Protecting Oracle Database 12c / Paul Wright
Published Berkeley, CA : Apress, 2014
New York, NY : Distributed to the Book trade worldwide by Springer
©2014

Copies

Description 1 online resource (xviii, 292 pages) : illustrations
Series The expert's voice in Oracle
Expert's voice in Oracle.
Contents At a Glance; Part1: Security Overview and History; Chapter 1: Oracle Security History; Chapter 2: Current State of the Art; Google Hacking tnsnames.ora; Attacking without tnsnames.ora; Attacking the Standby Database; Attacking the Backups; Brute Force Remotely Over the Network; Attacking the SYS Account; TNS Poison Proxy Attack; Privilege Escalation; Database Link Security; Chapter 3: Extrapolating Current Trends; GPU -Supported Password Cracking; Strong Password Philosophy; Raising the Decryption Bar; Moving to the Cloud; Ensuring Replication Security; General Trends
Into the FuturePart 2:Defense Cookbook; Chapter 4: Managing Users in Oracle; User Management Limitations; Controlling System Privilege Usage by Wrapping; Wrapping Alter User; Grant Schema Wide; Time-based Privileges; Listing and Assigning Privileges to Users; Bypassing User Management Controls; Access to User Password Information; LAST_LOGIN; Chapter 5: Oracle Vulnerability Scanning; Retrospective; Tools of the Trade; Penetration Testing; Reviewing the Results; Additional Protection; Permissions; Chapter 6: Centralized Native Auditing and IPS; The Unified Audit Trail; A Centralized Syslog
Management and ReportingSearching the Audit Trail; Ongoing Maintenance; Alerting to Syslog Content; Native Intrusion Prevention; Chapter 7: Pluggable Database Primer; Reasons for Pluggable Databases; Simple View of 12c Container Structure; Understanding Users and Roles in 12c; Creating Common Roles; Switching Containers; Cloning the Seed Database; Pluggable DB Commands; Upgrading to 12c Multi-tenancy; Part3: Security in the 12c Release; Chapter 8: New Security Features in 12C; Data Redaction; Database Auditing; Context of the Changes to Audit Trail in 12c; Actual 12c Release Audit Trail
Privilege AnalysisTransparent Sensitive-Data Protection; Transparent Data Encryption; Database Vault; Database Application Security Architecture; Definer's Roles; SELECT ANY DICTIONARY Privilege; Breaking Up SYSDBA Privilege; 12c Miscellaneous Security Improvements; Security Features Not in 12c; Chapter 9: Design Flaws, Fixed and Remaining in 12C; Remote SYS Brute-Force Attacks; Default Account Attacks; Privilege Escalation through Public Privileges; Public Privileges; Definer's Roles; SYSDBA Phishing; Database Link Issues; Passwords; OS Access from the DB; Privilege Escalation to SYSDBA
Privilege ExtensionChapter 10: Security Issues in 12c; Segregated Groups of User Privilege; DBMS_ADVISOR Directory Privileges; GRANT ANY OBJECT PRIVILEGE Control Bypass; Redaction Bypasses; 12c Passwords and Cryptography; DBlink Decryption in 12c; Network Authentication Decryption in 12c; Phishing for SYSDBA; Chapter 11: Advanced Defense and Forensic Response; Controlling the PUBLIC Role; State-Checking Query; OS Checksum Automation; Securing the DB from the OS; Controlling Database Link Permissions; Enterprise Manager and Cloud Control Security; Oracle Forensics; History of Oracle Forensics
Summary Protecting Oracle Database 12c shows how to secure Oracle Databases, especially when deploying the new consolidation features of Oracle's cloud feature set
Notes Includes index
English
Online resource; title from PDF title page (SpringerLink, viewed April 21, 2014)
SUBJECT Oracle (Computer file) http://id.loc.gov/authorities/names/n91015760
Oracle (Computer file) fast
Subject Database security.
Data encryption (Computer science)
Database management.
COMPUTERS -- Databases -- General.
Data encryption (Computer science)
Database management
Database security
Form Electronic book
ISBN 9781430262121
1430262125