Oracle Database Application Security
With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
(Sprache: Englisch)
Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
Fr. 65.00
inkl. MwSt.
- Kreditkarte, Paypal, Rechnungskauf
- 30 Tage Widerrufsrecht
Produktdetails
Produktinformationen zu „Oracle Database Application Security “
Klappentext zu „Oracle Database Application Security “
Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about identity preservation, policies and fine-grained audits. Moving on to virtual private databases, you'll set up and configure a VPD to work in concert with other security features in Oracle, followed by tips on managing configuration drift, profiles, and default users. Shifting focus to coding, you will take a look at secure coding standards, multi-schema database models, code-based access control, and SQL injection. Finally, you'll cover single sign-on (SSO), and will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM), and Oracle Identity Management (OIM) by installing and configuring them to meet your needs.
Oracle databases hold the majority of the world's relational data, and are attractive targets for attackers seeking high-value targets for data theft. Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. This book gets you ready to avoid that nightmare scenario.
What You Will Learn
- Work with Oracle Internet Directory using the command-line and the console
- Integrate Oracle Access Manager with different applications
- Work with the Oracle Identity Manager console and connectors, while creating your own custom one
- Troubleshooting issues with OID, OAM, and OID
- Dive deep into file system and network security concepts
Who This Book Is For
Oracle DBAs and developers. Readers will need a basic understanding of Oracle RDBMS and Oracle Application Server to take complete advantage of this book.
Inhaltsverzeichnis zu „Oracle Database Application Security “
Chapter 01 - EncryptionReaders will go through Transparent Data, Back-up and Network Encryption. They will learn to work with ghost data and cross border issues with networks
-Transparent Data Encryption1.Keystore2.Column Encryption3.Tablespace Encryption4.External Table Encryption5.Ghost Dataa.How it happensb.How to fix it.6.Column Encryption7.Tablespace Encryptiona.Full Database Encryptionb.Online Encryption8.External Tables9.Algorithms
-Backup encryption1.RMAN2.Data Pump-Network1.Configurationa.Requireb.Requestc.Acceptedd.Rejected2.Cross Border Issues3.Integrity
Chapter 02 - Audit
This chapter will take readers through the audit process. They will learn about key policies and identity preservation. Readers will also take a look at how fine grain audits work.
-Identity Preservation
-Policy
-Needs to tell1.Who2.What3.When 4.Where 5.How
-Fine Grained Audit
Chapter 03 - Virtual Private Database
This chapter will teach readers key intrusion detection tools like Database Firewall and SNORT. Readers will also get tips on managing Configuration Drift, profiles and default users.
-Intrusion Detection tools1.Database Firewall2.SNORT
-Configuration Drift1.Connectionsa.Newb.Frequency2.ORACLE_HOMEa.Tripwire3.Objectsa.Newb.Alteredc.Dropped
-Users1.Object Accessa.Privilege Analysisb.GrantsRolesS/U/I/D/EColumnc.Fine Grained Access Control (VPD)
-Profiles
-Default users1.Can you drop them?2.Default password3.Impossible password4.Expired5.Locked
Chapter 04 - File System Access
Readers will learn about tools to access file systems.
-Directories-utl_file
Chapter 05 - Network access and Evaluation
This chapter will teach readers about accessing networks with tools like ACL and DBSAT. Readers will also look at some network evaluation tools.
-ACL-Evaluation Tools-DBSAT
Chapter 06 - Coding
Chapter will be about understanding secure
... mehr
coding standards. Readers will also learn about SQL Injection.
-Importance of secure coding standards.-Multi-Schema database model.1.Decorations Schema2.Business Logic Schema3.API Schema4.Data Objects Schema5.Errors / Help Desk Schema-Public Synonyms-Sys_context-Accessible by-Authid1.Definer's rights2.Current_user (invoker)3.Inherit privileges-Code Based Access control-Sql injection1.Secure shell-Error messages
Chapter 07 - Single Sign On (SSO)
Readers will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM) and Oracle Identity Management (OIM) by installing and configuring them to your needs. They will then learn to work with OID using command line and console. Chapter will also cover OAM integration with different applications and working with the OIM console.
-Definition for SSO-Working with SSO1.Oracle Internet Directory2.Oracle Access Manager3.Oracle Identity Access Management
-Installation and Administration1.OID 2.OAM 3.OIM
-Working with Oracle Internet Directory1.OID using command line2.OID using console3.Troubleshooting OID Issues.
-Access Control with Oracle Access Manager1.OAM concepts2.Integrate OAM with different applications3.Provide access to users with OAM4.Troubleshooting
-User Management with Oracle Identity Manager1.OIM Concepts2.Working with OIM console3.OIM Connectors4.Create your own custom connector.5.Troubleshooting
-Importance of secure coding standards.-Multi-Schema database model.1.Decorations Schema2.Business Logic Schema3.API Schema4.Data Objects Schema5.Errors / Help Desk Schema-Public Synonyms-Sys_context-Accessible by-Authid1.Definer's rights2.Current_user (invoker)3.Inherit privileges-Code Based Access control-Sql injection1.Secure shell-Error messages
Chapter 07 - Single Sign On (SSO)
Readers will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM) and Oracle Identity Management (OIM) by installing and configuring them to your needs. They will then learn to work with OID using command line and console. Chapter will also cover OAM integration with different applications and working with the OIM console.
-Definition for SSO-Working with SSO1.Oracle Internet Directory2.Oracle Access Manager3.Oracle Identity Access Management
-Installation and Administration1.OID 2.OAM 3.OIM
-Working with Oracle Internet Directory1.OID using command line2.OID using console3.Troubleshooting OID Issues.
-Access Control with Oracle Access Manager1.OAM concepts2.Integrate OAM with different applications3.Provide access to users with OAM4.Troubleshooting
-User Management with Oracle Identity Manager1.OIM Concepts2.Working with OIM console3.OIM Connectors4.Create your own custom connector.5.Troubleshooting
... weniger
Autoren-Porträt von Osama Mustafa, Robert P. Lockard
Osama Mustafa is a database specialist, an Oracle ACE Director, Certified Oracle Professional (10g, 11g), Certified Ethical Hacker and Sun System Administrator. Osama currently works as an Oracle Instructor in the Middle East. He also works on troubleshooting and the implementation of database projects. He spends his free time on Oracle OTN forums and publishes many articles, including Oracle database articles, on his blog.Robert P. Lockard is an Oracle ACE Director, a professional Oracle DBA, designer, developer, and project manager with more than three decades of experience. For the past twenty years he has worked as an independent consultant providing quality services to his customers at a reasonable price. Robert has worked in financial intelligence tracking money laundering, terrorist money, and identity theft. He has also worked in the cyber crimes arena tracking attacks on information systems. He specializes in evaluating and securing your Oracle database environment from threats both external and internal.
Bibliographische Angaben
- Autoren: Osama Mustafa , Robert P. Lockard
- 2019, 1st ed., XVII, 341 Seiten, Masse: 15,6 x 23,6 cm, Kartoniert (TB), Englisch
- Verlag: Springer, Berlin
- ISBN-10: 1484253663
- ISBN-13: 9781484253663
- Erscheinungsdatum: 07.11.2019
Sprache:
Englisch
Kommentar zu "Oracle Database Application Security"
0 Gebrauchte Artikel zu „Oracle Database Application Security“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Oracle Database Application Security".
Kommentar verfassen