Skip to:Content
|
Bottom
Cover image for Oracle security handbook
Title:
Oracle security handbook
Personal Author:
Publication Information:
New York : McGraw-Hill /Osborne, 2001
ISBN:
9780072133257
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010019322 QA76.9.D314 T43 2001 Open Access Book Book
Searching...

On Order

Summary

Summary

This text teaches readers the why and how of implementing security plans in an Oracle environment. It proceeds logically through the necessary steps, which include: understanding Oracle's security architecture and implementing a plan; securing and interacting with OS's - Windows NT/2000, UNIX, and Linux; securing the database - with concrete examples; securing the network - with coverage of Web site and Oracle Portal security; and protecting against hackers, auditing and troubleshooting. Supplemental information including a glossary of terms, security risk assessment review, a hands-on tutorial to securing a server, and new security features for Oracle9i is also included.


Table of Contents

Acknowledgmentsp. xv
Prefacep. xix
Part I Beginnings
1 Security Architecturep. 3
The Evolution of Securityp. 4
Enter the Computerp. 5
Know Your Threatsp. 8
Threats from Withinp. 9
External Threatsp. 12
Where Security Holes Come Fromp. 15
Determining Who Can Do Whatp. 18
Authenticationp. 18
Authorizationp. 26
System Integrityp. 27
A Look at Different Authentication Modelsp. 28
2 Oracle Security Implementationp. 33
Oracle Security Backgroundp. 36
About Backupsp. 38
Moving Toward More Robust Securityp. 40
Version 6 and New Security Approachesp. 45
Along Came Oracle7p. 48
Introduction of Oracle8p. 55
Oracle8i and the Internetp. 60
A Look at Oracle8i Advanced Security Featuresp. 62
3 Planning Your Securityp. 71
Defining Your Security Planp. 72
The Security Trade-Offp. 74
The Role of a Security Planp. 75
Global vs. Local Policiesp. 77
Assigning Responsibilityp. 79
Proceduresp. 81
Measuring Riskp. 92
How Vulnerable Are You?p. 92
Valuing Assetsp. 95
Alternate Solutionsp. 96
Database Life Stagesp. 97
Legacy Systemsp. 97
New Systemsp. 99
Evaluating Database Software Packagesp. 100
Part II Securing the Operating System
4 Database Security on Unix Operating Systemsp. 105
Why We Need an Operating Systemp. 106
Types of Operating Systemsp. 107
Securing Unixp. 110
Basic Unix Security Featuresp. 110
Locking Down the Operating Systemp. 119
Securing Oracle on Unixp. 123
How the Oracle Database Runsp. 123
Installing Oracle on Unixp. 124
Using a Secure Temporary Directoryp. 133
Security of Raw Devicesp. 134
Oracle Files with Suid Bit Onp. 135
Osdba, Osoper, and Internalp. 138
A Warning About SQL *Plus Usagep. 140
Writing the Audit Trail to the Operating Systemp. 140
5 Oracle and Windows NT/2000 Securityp. 143
Windows NT/2000 Basicsp. 144
Examining Windows NT Security Issuesp. 145
Overview of Windows NT with Oraclep. 163
How Windows NT Worksp. 163
Processes vs. Threadsp. 166
Viewing the Oracle Threadsp. 168
Oracle and the Windows Registryp. 171
Protecting Oracle on Your Windows NT/2000 Systemp. 175
Protecting Oracle Softwarep. 175
6 Operating System Authenticationp. 179
Configuring Authenticationp. 181
Setting Parametersp. 181
TNS Protocolp. 183
Windows Authenticationp. 186
Sending Credentials Across the Networkp. 189
Creating a Windows Database Userp. 189
Creating a Windows Userp. 192
Windows Operating System Rolesp. 199
Unix Operating System Authenticationp. 204
Creating a Unix Database Userp. 205
Part III Securing the Oracle Database
7 Passwords and Usersp. 209
Oracle Password Management Featuresp. 211
About Password Enhancementsp. 211
Default Oracle Usersp. 220
Examining the Default Usersp. 220
External and Remote User Identificationp. 232
About Orapwdp. 233
8 Privileges, Grants, Roles, and Viewsp. 239
About Objects and Privilegesp. 240
About Usersp. 243
Controlling User Accessp. 244
About Granting Privilegesp. 251
How to Use Rolesp. 254
Oracle-Supplied Rolesp. 258
About User Default Rolesp. 261
Using Viewsp. 264
Creating Viewsp. 265
About Triggersp. 267
9 Oracle and Database Linksp. 269
Basic Database Link Architecturep. 271
Creating a Database Linkp. 274
Security Problem with Database Linksp. 281
About Shared Database Linksp. 285
More About Global Database Linksp. 286
Auditing Database Linksp. 292
10 Security and Developer Toolsp. 295
Application Securityp. 296
Database vs. Application Usersp. 297
Building Application Security into the Databasep. 298
Application Design Practicesp. 301
Oracle Call Interfacep. 305
Auditing to Monitor Database Activityp. 312
Virtual Private Databasep. 314
Fine-Grained Access Controlp. 315
Application Contextp. 316
Invoker Rights vs. Definer Rightsp. 319
Definer Rightsp. 320
Invoker Rightsp. 321
PL/SQL Packagesp. 322
Dbms_Obfuscation_Toolkitp. 323
Utl_File Packagep. 324
Part IV Secure Network Communications
11 Network Integrity, Authentication, and Encryptionp. 329
Introduction to Oracle Advanced Security Optionp. 330
Sniffing and Spoofingp. 331
Hijacking a Connectionp. 334
Protecting Data on the Networkp. 334
Native Features of OASp. 340
Configuring Authenticationp. 342
Configuring Integrityp. 344
Configuring Encryptionp. 345
Secure Sockets Layer Protocolp. 346
Configuring SSLp. 347
Debugging an SSL Connectionp. 355
Enterprise User Securityp. 356
Recommended Protocolsp. 357
12 Oracle Security Optionsp. 359
Virtual Private Databasesp. 361
Creating a VPDp. 363
A Look at Oracle Label Securityp. 373
Oracle Internet Directoryp. 376
About LDAP Architecturep. 376
Oracle Internet Directory Implementationp. 382
13 Firewalls and Oraclep. 389
How Firewalls Workp. 390
Firewall Approachesp. 392
What a Firewall Does Not Preventp. 396
Types of Firewallsp. 396
Using Oracle Through a Firewallp. 397
The Problemp. 399
Determining Whether a Connection Problem Is a Firewallp. 400
Firewall Proxiesp. 402
Listener Servicep. 404
Connection Managerp. 405
Preventing Port Redirectionp. 408
14 Apache HTTP Server Securityp. 411
About Web Serversp. 412
Web Server Tasksp. 412
Oracle's Apache Implementationp. 418
Apache Installation and Configurationp. 419
Oracle HTTP Configuration Filep. 431
Apache Securityp. 432
15 Oracle Portal Security Managementp. 435
Oracle Portal--From the Beginningp. 436
Oracle Portal Initial Usersp. 437
Portal Authentication Managementp. 441
User Account Typesp. 442
User Managementp. 443
Adding Usersp. 443
Editing a Userp. 449
Self-Service User Maintenancep. 458
Configuring the Login Serverp. 460
Password Policy Managementp. 461
Authenticating Usersp. 466
Object Access Managementp. 472
Creating Groupsp. 472
Granting Access to Users and Groupsp. 474
Granting Public Access to Pages and Applicationsp. 483
Part V Hackers and Troubleshooting
16 Implementing Auditingp. 487
About Auditingp. 489
Auditing Questions to Askp. 489
Customizing Database Auditingp. 501
A Table Auditing Approachp. 504
Table Audit Scriptsp. 505
17 Hacker-Proofing Your Databasep. 517
Attackersp. 519
Disgruntled Employeesp. 519
Professional Hackersp. 527
Vandalsp. 530
Authorized User Gaining Elevated Privilegesp. 531
Types of Attacksp. 532
Buffer Overflowsp. 532
SQL Injection Attackp. 534
Reporting a Vulnerabilityp. 537
Independent Security Evaluationsp. 538
Tools for Protecting Your Databasep. 539
Security Assessmentp. 540
Intrusion Detectionp. 540
Encryptionp. 541
Choosing a Product Strategyp. 543
A Glossaryp. 545
B Security Risk Assessment Checklistsp. 555
Physical Security of Hardwarep. 556
Equipment, Tapes, and Disksp. 558
Operating System and Network Securityp. 559
Password and Account Managementp. 561
Backup and Recoveryp. 563
Legal Issuesp. 565
Policies and Proceduresp. 566
Oracle-Specific Issuesp. 567
Other Security Issuesp. 569
C Steps to Secure Your Systemp. 571
Change Default Passwordsp. 572
Enable Password Management Featuresp. 573
Remove Unnecessary Privileges Granted to Publicp. 574
Set Parameters Securelyp. 575
Place Your Oracle Database(s) Behind a Firewallp. 575
Set the Listener Passwordp. 576
Enable SSL for Network Encryptionp. 577
Harden the Operating Systemp. 578
Download and Apply Security Patchesp. 578
D System Privileges and Audit Optionsp. 579
E Oracle9i Security Featuresp. 585
Data Securityp. 586
Secure Application Rolesp. 587
Proxy Authenticationp. 587
Java Securityp. 588
PKI Supportp. 588
Oracle Advanced Security Optionp. 589
Oracle9i Data Guardp. 589
Fine-grained Auditingp. 590
Oracle Netp. 591
Default Accounts and Passwordsp. 592
Indexp. 593
Go to:Top of Page