ABSTRACT

This guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that should be taken to enable, configure, or administer security-related features. It includes best practices in securing Oracle and on Oracle security options and products. By providing specific instructions and examples this book bridges the gap between the individuals who install and configure a security feature and those who secure and audit it.

chapter 2|18 pages

Hardening the Database

chapter 3|24 pages

Securing the Listener

chapter 4|20 pages

Account Security

chapter 6|28 pages

Authentication

chapter 7|24 pages

Encrypting Data-in-Transit

chapter 8|36 pages

Encrypting Data-at-Rest

chapter 9|26 pages

Standard Auditing

chapter 10|10 pages

Mandatory and Administrator Auditing

chapter 11|12 pages

Fine-Grained Auditing

chapter 13|30 pages

Oracle Audit Vault

chapter 14|74 pages

Database Activity Monitoring

chapter 16|24 pages

Virtual Private Database

chapter 17|30 pages

Oracle Database Vault