Description |
1 online resource (xviii, 292 pages) : illustrations |
Series |
The expert's voice in Oracle |
|
Expert's voice in Oracle.
|
Contents |
At a Glance; Part1: Security Overview and History; Chapter 1: Oracle Security History; Chapter 2: Current State of the Art; Google Hacking tnsnames.ora; Attacking without tnsnames.ora; Attacking the Standby Database; Attacking the Backups; Brute Force Remotely Over the Network; Attacking the SYS Account; TNS Poison Proxy Attack; Privilege Escalation; Database Link Security; Chapter 3: Extrapolating Current Trends; GPU -Supported Password Cracking; Strong Password Philosophy; Raising the Decryption Bar; Moving to the Cloud; Ensuring Replication Security; General Trends |
|
Into the FuturePart 2:Defense Cookbook; Chapter 4: Managing Users in Oracle; User Management Limitations; Controlling System Privilege Usage by Wrapping; Wrapping Alter User; Grant Schema Wide; Time-based Privileges; Listing and Assigning Privileges to Users; Bypassing User Management Controls; Access to User Password Information; LAST_LOGIN; Chapter 5: Oracle Vulnerability Scanning; Retrospective; Tools of the Trade; Penetration Testing; Reviewing the Results; Additional Protection; Permissions; Chapter 6: Centralized Native Auditing and IPS; The Unified Audit Trail; A Centralized Syslog |
|
Management and ReportingSearching the Audit Trail; Ongoing Maintenance; Alerting to Syslog Content; Native Intrusion Prevention; Chapter 7: Pluggable Database Primer; Reasons for Pluggable Databases; Simple View of 12c Container Structure; Understanding Users and Roles in 12c; Creating Common Roles; Switching Containers; Cloning the Seed Database; Pluggable DB Commands; Upgrading to 12c Multi-tenancy; Part3: Security in the 12c Release; Chapter 8: New Security Features in 12C; Data Redaction; Database Auditing; Context of the Changes to Audit Trail in 12c; Actual 12c Release Audit Trail |
|
Privilege AnalysisTransparent Sensitive-Data Protection; Transparent Data Encryption; Database Vault; Database Application Security Architecture; Definer's Roles; SELECT ANY DICTIONARY Privilege; Breaking Up SYSDBA Privilege; 12c Miscellaneous Security Improvements; Security Features Not in 12c; Chapter 9: Design Flaws, Fixed and Remaining in 12C; Remote SYS Brute-Force Attacks; Default Account Attacks; Privilege Escalation through Public Privileges; Public Privileges; Definer's Roles; SYSDBA Phishing; Database Link Issues; Passwords; OS Access from the DB; Privilege Escalation to SYSDBA |
|
Privilege ExtensionChapter 10: Security Issues in 12c; Segregated Groups of User Privilege; DBMS_ADVISOR Directory Privileges; GRANT ANY OBJECT PRIVILEGE Control Bypass; Redaction Bypasses; 12c Passwords and Cryptography; DBlink Decryption in 12c; Network Authentication Decryption in 12c; Phishing for SYSDBA; Chapter 11: Advanced Defense and Forensic Response; Controlling the PUBLIC Role; State-Checking Query; OS Checksum Automation; Securing the DB from the OS; Controlling Database Link Permissions; Enterprise Manager and Cloud Control Security; Oracle Forensics; History of Oracle Forensics |
Summary |
Protecting Oracle Database 12c shows how to secure Oracle Databases, especially when deploying the new consolidation features of Oracle's cloud feature set |
Notes |
Includes index |
|
English |
|
Online resource; title from PDF title page (SpringerLink, viewed April 21, 2014) |
SUBJECT |
Oracle (Computer file) http://id.loc.gov/authorities/names/n91015760
|
|
Oracle (Computer file) fast |
Subject |
Database security.
|
|
Data encryption (Computer science)
|
|
Database management.
|
|
COMPUTERS -- Databases -- General.
|
|
Data encryption (Computer science)
|
|
Database management
|
|
Database security
|
Form |
Electronic book
|
ISBN |
9781430262121 |
|
1430262125 |
|