Đang chuẩn bị liên kết để tải về tài liệu:
Applied Oracle Security: Developing Secure Database and Middleware Environments- P23

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Applied Oracle Security: Developing Secure Database and Middleware Environments- P23:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 194 Part II Oracle Database Vault It is easy to see that DBV factor assignment provides additional access control and validation capabilities when used as a wrapper for traditional methods of asserting client information that use the DBMS_SESSION or DBMS_APPLICATION_INFO packages. The feature provides the same benefits when used in lieu of custom Oracle application context objects and reduces the number of objects that must be maintained. The feature extends the overall auditing capability for these traditional mechanisms while preserving the existing audit capabilities on which applications may rely. DBV Secure Application Roles Oracle SARs are database roles that can be enabled only from within a PL SQL program. The PL SQL program will typically perform a series of checks to determine whether the conditions are correct for the role to be enabled. DBV provides an integration capability with Oracle SARs that allow you define these conditions using a DBV rule set. To help illustrate how DBV Secure Application Roles work consider the DBV Is System Maintenance Allowed rule set presented earlier in the chapter. This rule set allowed system maintenance routines on Fridays from 5 to 11 p.m. We can reuse this rule set to control the ability to set a role that has DELETE privileges on tables protected by the Sales History DBV realm for the purpose of archiving and deleting records that no longer need to be maintained in the table. Privileges that allow for the update or deletion of data are typically considered security-sensitive operations and are perfect candidates for DBV SARs. tip Use DBV SARs for security-sensitive privilege sets. The first step in creating this type of capability requires that the DBV security administrator DBVOWNER create the DBV SARs using the DBMS_MACADM.CREATE_ROLE PL SQL procedure. To secure the role from being granted or revoked outside the control of the Sales History realm administrator MARY we should also protect the role in the Sales .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.