Location via proxy:
[ UP ]
[Report a bug]
[Manage cookies]
No cookies
No scripts
No ads
No referrer
Show this form
Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
100%
(4)
100% found this document useful (4 votes)
6K views
Database Security PDF
Uploaded by
Peter Asan
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save database security.pdf For Later
Download
Save
Save database security.pdf For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
100%
(4)
100% found this document useful (4 votes)
6K views
Database Security PDF
Uploaded by
Peter Asan
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save database security.pdf For Later
Carousel Previous
Carousel Next
Save
Save database security.pdf For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 443
Search
Fullscreen
DATABASE SECURITY AND AUDITING PROTECTING DATA INTEGRITY AND AGGCESSIBILITY HASSAN A. AFYGILINIDATABASE SECURITY AND AUDITING: Protecting Data Integrity and Accessibility By Hassan A. AfyouniTHORSON oa COURSE TECHINOLENGi¥ Database Security and Auditing: Protecting Data Integrity and Accessibility By Hassan A. Afyouni Bxecutive Editor: Mac Mendelsohn ‘Senior Product Manager: Bunce Yeates-Fogle Senior Acquisitions Bditor: Maureen Martin Editorial Assistant: Jennifer Smith COPYRIGHT © 2006 Thomson Course ‘Technology, division of Thomson Learns Inc. Thomson Learning™ ia trademark used herein under license Printed in Canada 123456789WCo9 08070605 For more information, contact Thomson (Course Technology, 25 Thomson Place, Boston, Massachusets, 02210 (Or find us on the World Wide Web Development Editor: Gretchen Kiser Production Editors: Brooke Booth, Cecile Kaufinan ‘Senior Marketing Manager: Karen Seite Associate Product Manager: Mirella Misiaszek ALL RIGHTS RESERVED. No pat of thie work ‘covered bythe copyright hereon maybe epro- duced or used in any forin or by ay rmeane— tion, of information storage and retrieval sy=- tems—ithout the veritten permission of the publisher For permision to use material from this text oF product, submits request online at ‘wonthomsoncights.com ‘Any additonal questions about permissions can be submited by e-mail to ‘thomsonrights@thomson.com (Quality Assurance Testing: Chris Scriver, Serge Palladino, Burt LaFountain Cover Designer: Laura Rickenbach Disclaimer: ‘Thomson Course Technology reserves the right to revise this publication and make changes from time to time in its content without notice. ‘The Web addresses inthis book are subject to change from time to time 3s necessary without ISBN 0-619-21559:3,sight Brief Contents introduction Part | Chapter One Security Architecture .... Chapter Two Operating System Security Fundamentals Chapter Three Administration of Users. Chapter Four Profiles, Password Policies, Privileges, and Roles Chapter Five Database Application Security Models Chapter Six Virtual Private Databases . Part it Chapter Seven Database Auditing Models . . Chapter Eight ‘Application Data Auditing. . 165 =207 -.287 = 283 Chapter Nine Auditing Database Activities. Part Ill Chapter Ten Security and Auditing Project Cases ...... 349 ‘Appendix A Appendix B Glossary. BibliographyTable of Contents Introduction. xiii i Part | Chapter One Security Architecture ...... Introduction Security Ee Information Systems. Database Management Systems Information Security .. Confidentiality Integrity... Availability. oe Information Security Architecture. Database Security Database Security Levels . Menaces to Databases . Asset Types and Their Value Security Methods Database Security Methodology ----- Database Security Definition Revisited -28 Chapter Summary Review Questions : Hands-on Projects ..... i Case Project . Chapter Two - Operating System Security Fundamentals .. Operating System Overview... ‘The Operating System Security Environment .. ‘The Components of an Operating System Security Environment .........-..++.37 Services... 37 vvi CONTENTS Files . : File Permissions ...... File Transfer. Sharing Files Memory Authentication Methods. ‘Authorization User Administration Password Policies Vulnerabilities of Operating Systems. . E-mail Security Chapter Summary . Review Questions. Hands-on Projects. Case Project .. Endnotes ....... 40 Chapter Three Administration of Users ....... Introduction Documentation of User Administration Operating System Authentic: Creating Users. Creating an Oraclel0g User .- IDENTIFIED Clause .... BY Password Option EXTERNALLY Option . GLOBALLY AS external_name Option = DEFAULT TABLESPACE tablespace_name Clause ‘TEMPORARY TABLESPACE tablespat QUOTA Clause .. PROFILE Clause . PASSWORD EXPIRE Clause ACCOUNT Clause . sen (Creating an Oracle10g User Using Database Authentication : Creating an Oraclel0g User Using External (Operating Stem) ‘Authentication Creating an Oracle User Using Global Authentic ‘Creating a SQL Server User ‘Windows Integrated (Trusted) Logins »CONTENTS vii Creating Windows Integrated. Losin. 2B SQL Server Login. : 76 Removing Users . : 9 Removing an Oracle User ..... “79 SQL Server: Removing Windows Integrated Logins 80 Modifying Users : ModifVing an Oracle User - SQL Server: Modifying Windows Integrated Login Attributes . Default Users See Oracle Server Default Users - SYS and ORAPWD Utility SQL Server Default Users . Remote Users. Database Links ‘Authentication Methods Linked Servers Remote Servers Practices for Administrators and Managers... Best Practices... Chapter Summary . Review Questions... Hands-on Projects ... Case Projects. Chapter Four Profiles, Password Policies, Privileges, and Roles .. . Introduction eee Defining and Using Profiles Creating Profiles in Oracle . Creating Profiles in SQL Server 2000 Designing and Implementing Password Policies What Isa Password Policy? ......-...4 Designing Password Policies Implementing Password Policies... Granting and Revoking User Privileges “6 16vii contents Privileges in SQL Server cee 2B Table and Database Objects Pies 136 ‘Column-level Privileges . Mi Creating, Assigning, and Revoking User Roles. Creating Roles with Oracle ...... ‘Creating Roles with SQL Server . : 146 Best Practices 155 Chapter Summary .. Review Questions Hands-on Projects ... Case Projects 156 157 157 160 Chapter Five Database Application Security Models . Introduction ‘Types of Users Security Models . ‘Access Matrix Model Access Modes Model . Application Types Client/Server Applications Web Applications .... Data Warehouse Applications .. Other Applications . Application Security Models Security Model Based on Database Roles Security Model Based on Application Roles Security Model Based on Application Fun: ‘ Security Model Based on Application Roles and Functions... Security Model Based on Application Tables ..............., Data Encryption ....... Chapter Summary Pharmacy Application Review Questions Hands-on Projects Case Projects... Endnotes i| CONTENTS ix Chapter Six Virtual Private Databases . Introduction Overview of Virtual Private Databases Implementing a VPD Using Views... Hiding Rows Based on the Current User Implementing a VPD Using Application Context, Implementing Oracle Virtual Private Databases .. Viewing VPD Policies and Application Context Using the Data Dictionary . : Viewing VPD Policies and Applicaton Contexts Using Policy Manager... : Implementing Row- and Colummlevel Security with SQLServer. 2243 Row-based Security Using Access Levels. Row-based Security Using Application Functions . Column-based Security .. Chapter Summary . Review Questions Hands-on Projects. Case Projects Part I Chapter Seven Database Auditing Models Introduction Auditing Overview ... Definitions . Auditing Activities Auditing Environment .. Auditing Process Auditing Objectives... Auditing Classifications and Types. ‘Audit Classifications Audit Types . Benefits and Side Effects of ring Auditing Side Effects .x CONTENTS: Auditing Models ‘Simple Auditing Model 1 ‘Simple Auditing Model 2 ‘Advanced Auditing Model . Historical Data Model : ‘Auditing Application Actions Model .......... 2 Security Chapter Summary Review Questions: «2... Hands-on Projects .....+.00+++ Case Projects ses eeseeseee Chapter Eight Application Data Auditing .... Introduction .........005 seeene DML Action Auditing Architecture Oracle Triggers SQL Server Triggers Creating Triggers : ‘ Implementation of an Historical Model with SQL Server Implementation of Application Actions Model with SQL Server Fine-grained Auditing (FGA) with Oracle .. DML Statement Audit Trail. DML Action Auditing with Oracle . Data Manipulation History .... History Auditing Model Implementation Using Oracle ..... DML Auditing Using Repository with Oracle (Simple 1) . DML Auditing Using Repository with Oracle (Simple 2) . ‘Auditing Application Errors with Oracle . Oracle PLISQL Procedure Authorization. Chapter Summary ...... cee 3d --324 337 34 344 Review Questions ........++ 345 Hands-on Projects .. 345 Case Projects .......1 347CONTENTS xi Chapter Nine Auditing Database Activities . Beenie 349 Introduction 350 Using Oracle Database Activities .. : 350 (Creating DLL Triggers with Oracle ee 2351 -382 Example of LOGON and LOGOFF Database Events - ee 355 ‘Auditing Code with Oracle .... ‘Auditing Database Acti Auditing DDL Activi Oracle Alert Log ‘Auditing Server Activity with Microsoft SQL Server 2000... ties with Oracle . 367 368 Implementing SQL Profiler .......... 368 Security Auditing with SQL Server 369 Data Definition Auditing .. 374 Database Auditing with SQL Server ....... 375 Database Errors Auditing with SQL Server . 376 Chapter Summary .. 377 Review Questions. 378 Hands-on Projects . 11378 Case Project Endnotes ..... Part Ill Chapter Ten Security and Auditing Project Cases Introduction See Case 1: Developing an Online Database Case 2: Taking Care of Payroll Case 3: Tracking Town Contracts Case 4: Tracking Database Changes (Case 5: Developing a Secured Authorization Repodtoryxii CONTENTS Appendix A Database Security Checklist Appendix B Database Auditing Checklist Glossary cece cee eres eran: 399 Bibliography . 5.0.0.0... eee sees ee 405Introduction THE COST OF DATA LOSS 1S RISING progressively every year. Companies are losing data due to malicious attacks and improper implementation of database security and auditing. Data integrity and accessibility must be protected in order to ensure the com- pany operability. ‘Yesterday's DBAs were equipped with all sorts of technical skills that empowered them to manage the database for optimal efficiency and use. Today's DBAS must have in addition the ability to implement security policies and auditing procedures in order to protect one of the most valuable assets of an organization—data. Data has become so Iission critical and indispensable an asset that an organization could become paralyzed and inoperable if data integrity, accessibility, and confidentiality is violated. This book is designed to provide the reader with an understanding of security con- cepts and practices in general and those specific to database security in a highly detailed implementation. Not only will te reader gain a good understanding of database secu- rity, the reader will be shown how to develop database applications embedding from simple to sophisticated security and auditing models using Oracle10g and Microsoft SQL Server 2000. Intended Audience This book is intended for any person who is involved with database applications. The reader could be a developer, system analyst, business analyst, data architect, database administrator, ora systems development manager working with database applications. This book can be used as a textbook in colleges and universities, in career training, schools, or as training material for companies with IT professionals. The book assumes the reader has a basic knowledge of database concepts. The book's pedagogical features are designed to provide a learning experience to equip the reader with all the tools nec- essary to implement database security and auditing in order protect data, Each chapter includes a case study that places the reader in the role of problem solver, requiring you to apply concepts presented in the chapter to achieve a successful solution. Book Organization This book is divided into three logical parts: the first part (Chapters 1 to 6) introduces, you to general concepts related to database security; the second part (Chapters 7 to 9) discusses topics related database auditing; and the third part (Chapter 10) provides prac- tical case projects covering all th xiiixiv DATABASE SECURITY AND AUDITING: PROTECTING DATA INTEGRITY AND ACCESSIBILITY Chapter Descriptions Here is a summary ofthe topics covered in each chapter of this book: (Chapter 1, “Security Architecture” presents fundamental security concepts that serve as. the building blocks to data and database security. This chapter covers important con cepts such as information systems components, database management systems function- alites, and major components of information security architecture. These concepts and ‘others are presented and explained from a database security perspective. ‘Chapter 2. The first line of defense is the network that connects users to the database and the second line of defense is the operating system of the server where the database resides. “Operating System Security Fundamentals” provides a quick but essential tour of the operating system functionalities from a security perspective. The focal points of the chapter are an explanation of the components of the operating system security environ ‘ment, operating system vulnerabilities, and password polices, Chapter 3, “Administration of Users” is a step-by-step walkthrough on how to create, drop, and modify user accounts in Oracle10g and SQL Server 2000. This chapter outlines all the various security risks related to user administrations that administrators must be ‘ware of. Finally, this chapter concludes with best practices adopted by database admin istration experts. Chapter 4, “Profiles, Password Policies, Privileges, and Roles” covers the security compo- nents of a database account. This chapter provides full description and instruction on how to administer these components and details on how to grant and revoke these com: ponents to and from database user accounts. This chapter concludes with best adminis- tration practices related to these topics. Administration instructions are provided for both Oraclel0g and SQL Server 2000. (Chapter 5, “Database Application Security Modes” presents concepts that are the core of «database application security It presents different application security models that can be adopted and implemented for most business models Chapters 6, “Virtual Private Databases” explains in detail the concept of virtual private databases and presents step-by-step implementa Oraclet0g. In addition, this chapter explores and implements virtual private database functionalities such as Application Context and Policy Manager provided by Oraclel0g. ‘Chapter 7, “Database Auditing Models is a fundamental chapter for understanding database auditing, The chapter explains the differences between and the interdependence of security and auditing, This chapter defines the role and responsibilities ofthe auditor and presents a full discussion of the auditing environment and auditing benefits and side ng effects. Another important part of this chapter is discussion of various database au ‘models to be implemented in Chapters 8 and 9. ‘Chapter 8, “Application Data Auditing” presents an implementation of application data changes auditing. Step-by-step instruction shows the reader how to develop and imple- ‘ment the database auditing models presented in Chapter 7 in both SQL Server and. Oracle10g. The fine-grained auditing feature provided by Oracle10g is outlined in this >n using views in SQL Server 2000 andFeatures INTRODUCTION xv ‘chapter along with detailed explanations on how it can be implemented as part of the database administration procedures. Chapter 9, “Auditing Database Activities” provides the reader with various demonstra- tions and illustrations on how to implement database auditing using Oracle10g and SQL Server 2000. Subtopics of database auditing include database events, data control state- ments, and data definition operations. A full description and implementation of Oracle10g AUDIT statement is provided in this chapter. SQL Server 2000 and Oraclel0g tracing facilities are also covered. Chapter 10, ‘Security and Auditing Project Cases” is implementation only. No new data- base concepts are presented. However, this chapter presents the most important phase of the learning process—implementation in practical business situations. This chapter presents five different cases that encompass all the major topics and materials covered in this book. Appendix A, “Security Checklist” presents a chec impact database security. of security dos and don'ts that “Appendix B, “Auditing Security” presents a checklist of auditing dos and don'ts for data- base auditing. ‘To help you in fully understanding database security and auditing, this book includes ‘many features designed to enhance your learning experience. ‘4 Chapter Objectives. Each chapter begins with a detailed list of the concepts to be mastered within that chapter. This list provides you with both a quick reference to the chapter's contents and a useful study aid. Illustrations and Tables. Numerous illustrations of security and auditing concepts and models are presented supplement text discussion. In addition, the many tables provide details of database objects presented in this book as well as some of the practical and theoretical information. Hands-On Projects. Although itis important to understand the database and audit- ing concepts, it is more important to improve and build your knowledge with real life implementation of hands-on projects. Each chapter provides includes several Hands-On Projects aimed at providing you with practical implementation of con- cepts and scenarios covered in each chapter. These projects cover both Oraclel0g. and Microsoft SQL Server 2000. = Chapter Summaries. Each chapter's text is followed by a summary of the concepts introduced in that chapter. These summaries provide a helpful way to review the ideas covered in each chapter. a Review Questions. The end-of-chapter assessment begins with a set of review ques- ions that reinforce the ideas introduced in each chapter. These questions help you evaluate and apply the material you have learned. Answering these questions will ensure that you have mastered the important concepts of database security and auditing.xvi DATABASE SECURITY AND AUDITING: PROTECTING DATA INTEGRITY AND ACCESSIBILITY Case Projects. Located at the end of each chapter are Case Projects. In these exten- sive exercises, you implement the skills and knowledge gained in the chapter through real design and implementation scenarios. & Glossary. For easy reference, a glossary atthe end of the book lists the key terms in alphabetical order along with definitions. = Step-by-step demonstrations. These ae essential components of the book illustrat- ing in detail how to implement most ofthe concepts presented in each chapter. ' Scenarios. Embedded within the chapter text, scenarios are very helpful in relating the concepts to real life situations. Text and Graphic Conventions ‘Wherever appropriate, additional information and exercises have been added to this book to help you better understand the topic at hand. Icons throughout the text alert You to additional materials. The icons used in this textbook are described below. ‘The Note icon draws your attention to additional helpful material related to the subject being described. Each Hands-On activity in this book is preceded by the Hands-On icon and a description of the exercise that follows. The Hands-On icon also appears in the chapter to identify which Hands-On Project provides practice for the current topic. (Case Project icons mark Case Projects, which are scenario-based assignments. In these ‘extensive case examples, you are asked to implement independently what you have learned. Special icons highlight information in the book that explain how you can secure information using people, products, or procedures. Instructor's Materials ‘The following additional materials are available when this book is used in a classroom setting. All of the supplements available with this book are provided to the instructor on a single CD-ROM. You can also retrieve these supplemental materials from the Course ‘Technology Web site, wwnn.course.com, by going to the page for this book, under “Download Instructor Files & Teaching Tools.” Electronic Instructor’s Manual. The Instructor’s Manual that accompanies this textbook includes the following items: additional instructional material to assist in class Preparation, including suggestions for lecture topics; recommended lab activities; tips on setting up a lab for the Hands-On Projects; and solutions to all end-of-chapter materials. ExamView Test Bank. This cutting-edge Windows-based testing software helps instruc- tors design and administer tests and pretest. In addition to generating tests that can be Printed and administered, this full-featured program has an online testing component that allows students to take tests at the computer and have their exams automatically graded. PowerPoint Presentations. This book comes with a set of Microsoft PowerPoint slides for each chapter. These slides are meant to be used as a teaching aid for classroom Presentations, to be made available to students on the network for chapter review, of to be printed for classroom distribution. Instructors are also at liberty to add their own slides for other topics introduced.INTRODUCTION xvii Figure files. All of the figures and tables in the book are reproduced on the Instructor's Resource CD, in bitmap format. Similar to PowerPoint presentations, these are included as a teaching aid for classroom presentation, to make available to students for review, or to be printed for classroom distribution. Lab Requirements To the User This book is divided into three parts and each partis designed to be read in sequence from beginning to end. Each chapter in the Database Security part builds on preceding chapters to provide a solid understanding of all the necessary concepts and practical {implementations of security in database applications. Also, each chapter in the Database Auditing builds on preceding chapters to provide a comprehensive understanding of auditing from a database perspective. The last part of the book is designed to provide the reader with practical cases using all concepts learned in previous parts of the book. Hardware and Software Requirements The following are the software requirements needed to perform cases and code pre- sented in the chapter and the end-of-chapter mate Oracle10g (10.1.0.2.0) ‘Windows SQL Server 2000 Oracle Enterprise Manager Oracle Policy Manager ‘Windows 2000 Please note that SQL Server will not install on Windows XP. For more information ‘on the SQL Server 2000 system requirements, please refer to the Microsoft™ Web site at: http: oem microsoft.com/sql/evaluation/sysreqs/2000/default.asp Specialized Requirements ‘The code presented in this book requires a good understanding of Oracle PL/SQL lan- guage and Microsoft SQL Server 2000 Transact-SQL language. In some instances knowl- edge of Oracle and Microsoft SQL Server administration may be required. Special Acknowledgments | would like to thank Jason Penniman for his contribution of writing the Microsoft SQL Server code presented in this book. His talent and skills never failed to amaze me.DATABASE SECURITY AND AUDITING: PROTECTING DATA INTEGRITY AND ACCESSIBILITY Acknowledgments ‘The completion of this book is attributed to every member of the team that worked dili- ‘gently on this project. My thanks to Mac Mendelsohn, Vice President, Product Technology Strategy, for giving me the opportunity to write this book, Maureen Martin for her sup- Port, and Eunice Yeates-Fogle for patiently managing this project. The Quality Assurance ‘Team, Chris Scriver, Serge Palladino, and Burt LaFountain did a terrific job, as did Brooke Booth and Cecile Kaufman who shepherded the manuscript through the production Process. Special thanks to my friends for their support: Robert Payne, Garry Boyce, Sou Chon Young, Bob Hurley, Vinnie Falcone, Barbara Griffin, and to the reviewers and pro- duction team. I am indebted to the following individuals for their respective contributions ‘of perceptive feedback on the initial proposal, the project outline, and the chapter-by- chapter reviews of the text: Randy Weaver, Everest College Barbara Nicolai, Purdue University Calumet Anthony Dashnaw, Clarkson University Michelle Hansen, Davenport University Kenneth Kleiner, Fayetteville Technical Community College G. Shankar, Boston University Dan Rafail, Lansing Community College Yiber Ramadani, George Brown College Debbie Rasnick, Virginia Highlands Community College John Russo, Wentworth Institute of Technology ‘Arjan Sadhwani, San José State University ‘Ningning Wa, University of Arkansas at Little Rock Dedication I dedicate this book to my beautiful, beloved, and devoted wife whose love and support is never ending, and to the pearls of my life: my daughter, Aya, and my sons, Wissam and Sammy. About the Author Hassan A. Afyouni has been working in the information technology field as a consultant for over fifteen years as database developer, database architect, database administrator, and data architect. He has been an instructor at several universities in Canada and the United States, a corporate trainer for some major corporations, and a curriculum devel- ‘per for various courses and programs.PART ONE Security Architecture LEARNING OBJECTIVES: Upon completion of this material, you should be able to: = Define security ‘= Describe an information system and its components Define database management system functionalities Outline the concept of information security [Identify tie major components of information security architecture List types of information assets and their values = Define database security = Describe security methods 4 = fae ee = = = = Ea faee EE cea 4 p—4 cae = od = ies = i= | Same Sa Same Seams fet rae2 CHAPTER 1 Introduction A quick look at security statistics reveals that security violations and attacks are increasing slobally at an annual average rte of 20% Statistics show that virus alerts, e-mail spam- ‘ming, identity theft, data theft, and other types of security breaches ae also on the rise, Rising ata faster rate are the related cost for preventive and protective measures. In response to this situation, organizations are focusing more heavily on the security of their information. This book places you inthe role of a database administrator who is respond: ing to this increasing focus on security by strengthening the security of your organization's database. The frst part of this book deals with topics that enable you to implement secu rity measures on your database to protect your data from a variety of violations. To pre- pare for the technical discussions inthe chapters to follow, this chapter presents an intro- duction to concepts such as general security, information systems, database management systems, and information security—all of which act as the basis for database security. To gain an understanding of the issues you would face as a database administrator {rying to implement increased security, consider the following scenarios. They give you a feeling for the types of security topics covered by the first half of this book. ‘A prominent institution hires you to manage a team of skilful database developers, architects, and administrators. Your fist challenge on the job is to design and implement ‘anew database security policy to secure data and prevent data integrity violations You are a database administrator fora small startup company. Your company just ‘won a contract from a large, reputable organization to implement a new database application. One of the requirements is to enforce astringent security policy, which ‘was never before a priority for your company. You are a database developer assigned to a new project, which involves the latest technology. As you read the functional specification of the module you are to build, you discover that the data to be stored must be encrypted. ‘These area few of the many scenarios you're likely to encounter as you progress through the world of work. This chapter covers both security principles and implementa- tion, in general, and database security, more specifically. Not long ago, most companies protected their data simply by preventing physical access to the servers where the data resided. This practice was sufficient until several inci- dents occurred in which data was jeopardized, compromised, and hijacked. Corporations quickly moved to enforcing security measures via operating systems, which prevented data violations by requiring the authentication of the identity of computer users. This approach was successful until new vulnerabilities and new threats brought different types Of risks to database systems and applicat Database management systems that depend on operating systems cannot survive without the implementation of security models that enforce strict security measures. Most database management systems did not have a secure mechanism for authentication and encryption until recently, when setious research and development was initiated to add security components that enable database administrators to implement security policies, Yesterday's DBA was equipped with all sorts of technical skills that empowered him ‘or her to manage a database efficiently. Today's DBA is required to have an additional skill—that of implementing security policies that protect one of the most valuable assets of a company—its data, ns,
You might also like
An Introduction To Database Systems, 8th Edition, C J Date - 4 PDF
PDF
100% (1)
An Introduction To Database Systems, 8th Edition, C J Date - 4 PDF
1,034 pages
Dbsecurity
PDF
No ratings yet
Dbsecurity
79 pages
Final Year Project
PDF
No ratings yet
Final Year Project
18 pages
MCQ Question Bank-IS-2
PDF
100% (2)
MCQ Question Bank-IS-2
6 pages
Database Security and Privacy UNIT - I - PPT
PDF
100% (1)
Database Security and Privacy UNIT - I - PPT
62 pages
Manual SQL Injection Using DVWA
PDF
100% (1)
Manual SQL Injection Using DVWA
16 pages
20764B Administering A SQL Database Infrastructure
PDF
No ratings yet
20764B Administering A SQL Database Infrastructure
6 pages
Less11 Security
PDF
No ratings yet
Less11 Security
27 pages
Oracle Database Security Primer
PDF
No ratings yet
Oracle Database Security Primer
147 pages
Database Security Notes
PDF
100% (1)
Database Security Notes
67 pages
Database and Applications Security Integrating Information Security and Data Management 1st Edition Bhavani Thuraisingham
PDF
100% (9)
Database and Applications Security Integrating Information Security and Data Management 1st Edition Bhavani Thuraisingham
73 pages
Database Security Lab Manual
PDF
100% (2)
Database Security Lab Manual
65 pages
Database Security
PDF
No ratings yet
Database Security
24 pages
Database - Security (1) Assignment
PDF
No ratings yet
Database - Security (1) Assignment
23 pages
Information Security Questions
PDF
No ratings yet
Information Security Questions
4 pages
Database Security and Privacy
PDF
No ratings yet
Database Security and Privacy
357 pages
Database Security
PDF
No ratings yet
Database Security
75 pages
Unit-4 Logical Design
PDF
100% (1)
Unit-4 Logical Design
25 pages
Data Base Security Syllabus
PDF
No ratings yet
Data Base Security Syllabus
2 pages
Chapter - 6 Database Security and Authorization
PDF
50% (2)
Chapter - 6 Database Security and Authorization
25 pages
KCG College of Technology, Chennai-96 Computer Science and Engineering
PDF
100% (1)
KCG College of Technology, Chennai-96 Computer Science and Engineering
11 pages
Database Security
PDF
No ratings yet
Database Security
19 pages
Database Security Assignment
PDF
100% (2)
Database Security Assignment
7 pages
MS SQL DBA Course Content
PDF
No ratings yet
MS SQL DBA Course Content
5 pages
Database Security Course Handout 2023
PDF
No ratings yet
Database Security Course Handout 2023
2 pages
Database Security and Auditing: Protecting Data Integrity and Accessibility
PDF
100% (1)
Database Security and Auditing: Protecting Data Integrity and Accessibility
46 pages
Database Security: Kennesaw State University
PDF
No ratings yet
Database Security: Kennesaw State University
78 pages
A Summer Training Presentation On Oracle 10G and
PDF
No ratings yet
A Summer Training Presentation On Oracle 10G and
24 pages
DBS Unit 2 Notes
PDF
No ratings yet
DBS Unit 2 Notes
38 pages
Lores ch03
PDF
No ratings yet
Lores ch03
46 pages
dss
PDF
No ratings yet
dss
10 pages
Database Security
PDF
No ratings yet
Database Security
101 pages
DSP Unit-2 Final
PDF
No ratings yet
DSP Unit-2 Final
31 pages
Auditing-Oracle-Database Joa Eng 1114
PDF
No ratings yet
Auditing-Oracle-Database Joa Eng 1114
7 pages
Chapter 3 Sim
PDF
No ratings yet
Chapter 3 Sim
11 pages
20764C - Administering A SQL Database Infrastructure: Acerca de Este Curso
PDF
No ratings yet
20764C - Administering A SQL Database Infrastructure: Acerca de Este Curso
6 pages
Database Security and Auditing: Protecting Data Integrity and Accessibility
PDF
No ratings yet
Database Security and Auditing: Protecting Data Integrity and Accessibility
37 pages
Oracle 19c Database Administrator
PDF
50% (4)
Oracle 19c Database Administrator
11 pages
database-security-on-premises_Day3_compressed
PDF
No ratings yet
database-security-on-premises_Day3_compressed
69 pages
Access Control Audit Procedures APG
PDF
No ratings yet
Access Control Audit Procedures APG
17 pages
Unit 5 Database Security and Auditing
PDF
No ratings yet
Unit 5 Database Security and Auditing
36 pages
Database Security & Audting
PDF
No ratings yet
Database Security & Audting
20 pages
Oracle Database Administration - Checklist Application Report
PDF
No ratings yet
Oracle Database Administration - Checklist Application Report
27 pages
Hacking & Defending Databases: Todd Desantis Technical Pre-Sales Consultant
PDF
No ratings yet
Hacking & Defending Databases: Todd Desantis Technical Pre-Sales Consultant
24 pages
11 How To Secure and Audit Oracle
PDF
No ratings yet
11 How To Secure and Audit Oracle
12 pages
Protecting Data With Encryption and Auditing
PDF
No ratings yet
Protecting Data With Encryption and Auditing
35 pages
Oracle Database Security Primer
PDF
No ratings yet
Oracle Database Security Primer
124 pages
Idera Whitepaper SQL Server Security Practices
PDF
No ratings yet
Idera Whitepaper SQL Server Security Practices
13 pages
2012-Conference - Presentation - UKOUG2012
PDF
No ratings yet
2012-Conference - Presentation - UKOUG2012
20 pages
DMS Chapter 5
PDF
No ratings yet
DMS Chapter 5
21 pages
Oracle Programming With Visual Basic
PDF
No ratings yet
Oracle Programming With Visual Basic
721 pages
Unit 3.1-2-3 Database Administration
PDF
No ratings yet
Unit 3.1-2-3 Database Administration
31 pages
iTLS - MS-20764
PDF
No ratings yet
iTLS - MS-20764
7 pages
DBMS_Module5
PDF
No ratings yet
DBMS_Module5
35 pages
Auditing Database Activity
PDF
No ratings yet
Auditing Database Activity
2 pages
Chap3 Notes
PDF
No ratings yet
Chap3 Notes
10 pages
Oracle DB Security
PDF
No ratings yet
Oracle DB Security
29 pages
KKW Unit 5 (EXTRA)
PDF
No ratings yet
KKW Unit 5 (EXTRA)
15 pages
College of Computing and Informatics Department of Information System Advanced Database System Project Title - Student Registration
PDF
No ratings yet
College of Computing and Informatics Department of Information System Advanced Database System Project Title - Student Registration
30 pages
4670 Lecture4 Profile Privilege
PDF
No ratings yet
4670 Lecture4 Profile Privilege
57 pages
5-Database Security
PDF
No ratings yet
5-Database Security
18 pages
Oracle NetCA Guide by Manish Sharma
PDF
No ratings yet
Oracle NetCA Guide by Manish Sharma
20 pages
Wireshark Slides PDF
PDF
No ratings yet
Wireshark Slides PDF
11 pages
Fish Prod and Management
PDF
No ratings yet
Fish Prod and Management
19 pages
The GRE Demystified
PDF
No ratings yet
The GRE Demystified
24 pages
UsingSQLDeveloper installingOracleExpress10g PDF
PDF
No ratings yet
UsingSQLDeveloper installingOracleExpress10g PDF
10 pages
Optimizing SQL Query Processing: Patient 1, 0 0 0, 0 0 0
PDF
No ratings yet
Optimizing SQL Query Processing: Patient 1, 0 0 0, 0 0 0
6 pages
Relational Calculus: Logic, Like Whiskey, Loses Its Beneficial Effect When Taken in Too Large Quantities
PDF
No ratings yet
Relational Calculus: Logic, Like Whiskey, Loses Its Beneficial Effect When Taken in Too Large Quantities
22 pages
STRONG Fitness Training Guide - Fall 2014 USA PDF
PDF
No ratings yet
STRONG Fitness Training Guide - Fall 2014 USA PDF
44 pages
Data Analytics
PDF
No ratings yet
Data Analytics
11 pages
STRONG Fitness Training Guide - Fall 2014 USA PDF
PDF
No ratings yet
STRONG Fitness Training Guide - Fall 2014 USA PDF
44 pages
A
PDF
No ratings yet
A
43 pages
QUICK GUIDE To Installing Oracle Database 11gR2 - PART1
PDF
No ratings yet
QUICK GUIDE To Installing Oracle Database 11gR2 - PART1
7 pages
Tax Avoidance PDF
PDF
No ratings yet
Tax Avoidance PDF
64 pages
Install Oracle Database 11gR2 On Ubuntu 12
PDF
No ratings yet
Install Oracle Database 11gR2 On Ubuntu 12
6 pages
Iprs For Kenya
PDF
100% (1)
Iprs For Kenya
15 pages
Web Development Joomla 2012
PDF
No ratings yet
Web Development Joomla 2012
178 pages
Related titles
Click to expand Related Titles
Carousel Previous
Carousel Next
An Introduction To Database Systems, 8th Edition, C J Date - 4 PDF
PDF
An Introduction To Database Systems, 8th Edition, C J Date - 4 PDF
Dbsecurity
PDF
Dbsecurity
Final Year Project
PDF
Final Year Project
MCQ Question Bank-IS-2
PDF
MCQ Question Bank-IS-2
Database Security and Privacy UNIT - I - PPT
PDF
Database Security and Privacy UNIT - I - PPT
Manual SQL Injection Using DVWA
PDF
Manual SQL Injection Using DVWA
20764B Administering A SQL Database Infrastructure
PDF
20764B Administering A SQL Database Infrastructure
Less11 Security
PDF
Less11 Security
Oracle Database Security Primer
PDF
Oracle Database Security Primer
Database Security Notes
PDF
Database Security Notes
Database and Applications Security Integrating Information Security and Data Management 1st Edition Bhavani Thuraisingham
PDF
Database and Applications Security Integrating Information Security and Data Management 1st Edition Bhavani Thuraisingham
Database Security Lab Manual
PDF
Database Security Lab Manual
Database Security
PDF
Database Security
Database - Security (1) Assignment
PDF
Database - Security (1) Assignment
Information Security Questions
PDF
Information Security Questions
Database Security and Privacy
PDF
Database Security and Privacy
Database Security
PDF
Database Security
Unit-4 Logical Design
PDF
Unit-4 Logical Design
Data Base Security Syllabus
PDF
Data Base Security Syllabus
Chapter - 6 Database Security and Authorization
PDF
Chapter - 6 Database Security and Authorization
KCG College of Technology, Chennai-96 Computer Science and Engineering
PDF
KCG College of Technology, Chennai-96 Computer Science and Engineering
Database Security
PDF
Database Security
Database Security Assignment
PDF
Database Security Assignment
MS SQL DBA Course Content
PDF
MS SQL DBA Course Content
Database Security Course Handout 2023
PDF
Database Security Course Handout 2023
Database Security and Auditing: Protecting Data Integrity and Accessibility
PDF
Database Security and Auditing: Protecting Data Integrity and Accessibility
Database Security: Kennesaw State University
PDF
Database Security: Kennesaw State University
A Summer Training Presentation On Oracle 10G and
PDF
A Summer Training Presentation On Oracle 10G and
DBS Unit 2 Notes
PDF
DBS Unit 2 Notes
Lores ch03
PDF
Lores ch03
dss
PDF
dss
Database Security
PDF
Database Security
DSP Unit-2 Final
PDF
DSP Unit-2 Final
Auditing-Oracle-Database Joa Eng 1114
PDF
Auditing-Oracle-Database Joa Eng 1114
Chapter 3 Sim
PDF
Chapter 3 Sim
20764C - Administering A SQL Database Infrastructure: Acerca de Este Curso
PDF
20764C - Administering A SQL Database Infrastructure: Acerca de Este Curso
Database Security and Auditing: Protecting Data Integrity and Accessibility
PDF
Database Security and Auditing: Protecting Data Integrity and Accessibility
Oracle 19c Database Administrator
PDF
Oracle 19c Database Administrator
database-security-on-premises_Day3_compressed
PDF
database-security-on-premises_Day3_compressed
Access Control Audit Procedures APG
PDF
Access Control Audit Procedures APG
Unit 5 Database Security and Auditing
PDF
Unit 5 Database Security and Auditing
Database Security & Audting
PDF
Database Security & Audting
Oracle Database Administration - Checklist Application Report
PDF
Oracle Database Administration - Checklist Application Report
Hacking & Defending Databases: Todd Desantis Technical Pre-Sales Consultant
PDF
Hacking & Defending Databases: Todd Desantis Technical Pre-Sales Consultant
11 How To Secure and Audit Oracle
PDF
11 How To Secure and Audit Oracle
Protecting Data With Encryption and Auditing
PDF
Protecting Data With Encryption and Auditing
Oracle Database Security Primer
PDF
Oracle Database Security Primer
Idera Whitepaper SQL Server Security Practices
PDF
Idera Whitepaper SQL Server Security Practices
2012-Conference - Presentation - UKOUG2012
PDF
2012-Conference - Presentation - UKOUG2012
DMS Chapter 5
PDF
DMS Chapter 5
Oracle Programming With Visual Basic
PDF
Oracle Programming With Visual Basic
Unit 3.1-2-3 Database Administration
PDF
Unit 3.1-2-3 Database Administration
iTLS - MS-20764
PDF
iTLS - MS-20764
DBMS_Module5
PDF
DBMS_Module5
Auditing Database Activity
PDF
Auditing Database Activity
Chap3 Notes
PDF
Chap3 Notes
Oracle DB Security
PDF
Oracle DB Security
KKW Unit 5 (EXTRA)
PDF
KKW Unit 5 (EXTRA)
College of Computing and Informatics Department of Information System Advanced Database System Project Title - Student Registration
PDF
College of Computing and Informatics Department of Information System Advanced Database System Project Title - Student Registration
4670 Lecture4 Profile Privilege
PDF
4670 Lecture4 Profile Privilege
5-Database Security
PDF
5-Database Security
Oracle NetCA Guide by Manish Sharma
PDF
Oracle NetCA Guide by Manish Sharma
Wireshark Slides PDF
PDF
Wireshark Slides PDF
Fish Prod and Management
PDF
Fish Prod and Management
The GRE Demystified
PDF
The GRE Demystified
UsingSQLDeveloper installingOracleExpress10g PDF
PDF
UsingSQLDeveloper installingOracleExpress10g PDF
Optimizing SQL Query Processing: Patient 1, 0 0 0, 0 0 0
PDF
Optimizing SQL Query Processing: Patient 1, 0 0 0, 0 0 0
Relational Calculus: Logic, Like Whiskey, Loses Its Beneficial Effect When Taken in Too Large Quantities
PDF
Relational Calculus: Logic, Like Whiskey, Loses Its Beneficial Effect When Taken in Too Large Quantities
STRONG Fitness Training Guide - Fall 2014 USA PDF
PDF
STRONG Fitness Training Guide - Fall 2014 USA PDF
Data Analytics
PDF
Data Analytics
STRONG Fitness Training Guide - Fall 2014 USA PDF
PDF
STRONG Fitness Training Guide - Fall 2014 USA PDF
A
PDF
A
QUICK GUIDE To Installing Oracle Database 11gR2 - PART1
PDF
QUICK GUIDE To Installing Oracle Database 11gR2 - PART1
Tax Avoidance PDF
PDF
Tax Avoidance PDF
Install Oracle Database 11gR2 On Ubuntu 12
PDF
Install Oracle Database 11gR2 On Ubuntu 12
Iprs For Kenya
PDF
Iprs For Kenya
Web Development Joomla 2012
PDF
Web Development Joomla 2012