Oracle Database Security
' ' In this book, security in Oracle database is explained with examples. Topics are prepared for Oracle 11g and Oracle 12c versions. Now that you've started reading this book, I assume you know how important database security is. For this reason, I do not see the need to classically mention how important information is for an institution in the preface. In addition, I will not provide statistical information such as how many people's personal information has been stolen from the databases, how many stolen credit card information has been shopped, how many databases have been rendered unusable by attackers this year. Because these are now indisputable facts; Even if an institution does not encounter such attacks today, it will certainly face it tomorrow. Worse, if the institution does not take precautions, it will not be able to prevent the information it has from falling into the hands of malicious people. From the point of view of the institution, such a loss causes a loss of reputation for an institution that cannot be measured with money, a decrease in customer trust for the institution, and worst of all, the malicious use of the stolen information without the knowledge of the owner. But I would like to share an interesting statistical information. 70% of information stealing from databases is done by employees for the institution. End users, who usually connect to the database with little authority, take advantage of database vulnerabilities to increase their authority and access information they should not see. Due to the fact that the authorizations of end users are not systematically audited, users with more than necessary authorizations can also access sensitive information. For this reason, this book describes how to protect information, especially against users within the organization.''
From Anıl Akduygu's Foreword
This book deals with database security in Oracle 11g and Oracle 12c.
in relation to; User Management, Authorization
(Authorization), Enterprise User Management, Oracle Virtual Private
Database, Advanced Security, SSL on network for database connections
Encryption, Symmetric Encryption, Application Context, Data Masking
, Secure Password Storage, access control to network services, and Database Auth
i Analysis topics are explained in detail with examples. Oracle database
security teams, database administrators, system administrators,
auditors, programmers, and anyone who wants to learn about database security
This book is a reference resource. Methods described in the book
Oracle database security, where we hold sensitive information by enforcing
we will raise. Introduction to follow the topics in the book
It is enough to have database knowledge at the level.
Book Content
User Management in Database
Enterprise User Security
Secure Password Storage
Authorization in Database
Authorization in Database Codes
Database Authority Analysis
Application Context
Virtual Private Database
Redaction - Data Redaction
Database Audit (Audit)
New Features in Auditing in Oracle 12c Release
Transparent Data Encryption
Network Encryption and Database SSL Connection
Detailed Access to Network Services