Introduction Oracle Database Security. Leeland Artra
|
|
|
- Mitchell Carroll
- 10 years ago
- Views:
Transcription
1 Oracle DB Management for SAs 1 of 45 Introduction Oracle Database Security Leeland Artra Cellworks Project University of Washington This presentation is online at: You can reach me for questions or comments at:leeland--at--greydragon-dot.com
2 Oracle DB Management for SAs 2 of 45 Security & Networking Did you lock the Gate?
3 Oracle DB Management for SAs 3 of 45 Syllabus Introduction to database security Definitions and nomenclature Oracle Privileges Oracle security methods Common security holes Evaluating security on Oracle SQL*Net Servers Summary
4 Oracle DB Management for SAs 4 of 45 Introduction Security is available to protect your major asset: DATA Many levels of security are available within Oracle - Account security - Access security - System-level security This section is mostly from the perspective of DATABASES and Oracle In the last few years a growing trend has emerged. The data is the most valuable asset, not the computers the data is stored on. So computer security has been a major area for development. Oracle, like the rest of the computer industry, has provided a large sampling of security settings for the database. Especially with Oracle7, where they introduced 80 plus attributes that can be controlled individually. The basic levels of security break down to account, access, and system level security. Account security is the right to connect to the database. The connection right or privilege is identified by an account. What that user or process can do is then governed by the access permissions associated with each object. Finally the overall Oracle system has its own security to control new table creation, or deletion. These combine to present a very complex and configurable security model.
5 Oracle DB Management for SAs 5 of 45 Who Is Attacking Oddly enough database hacking has not really been done in mass by the hacker communities (YET). You still need to worry about: Underpaid accountants Free thinking engineers Disgruntled employees (who are hiding the fact that they are upset) Over competative programmers Rival companies Unknown cracker/hacker on a random attack It is odd that the hacking community has not yet attacked databases. There is almost no information on hacking databases available publicly or even semi-privately. This is going to change as databases become more and more sophisticated. Additionally as databases grow more and more data that is of interest to the hackers will be placed into the databases. Thus, growing interest in how they work and how they break. Since databases have not come under heavy attack yet there most likely are hundreds of security holes that we are unaware of today. The best you can do is cover up the ones that are known and watch out for any new ones that may be discovered. Although the unknown attacker is a low probability today you still have to worry about that underpaid accountant in accounts receivables that sells financial information to competitors. Or how about that engineer who really thinks that everyone should be on a level playing field and is generously sharing product designs. Or that really upset person who didn t quit but is now in product development and selling product designs from within the company to a friend who has connections in the European technology marketplace. Not to mention those less than honorable programmers from an ally company that really are not good at doing their own work and are good at borrowing other peoples work. Don t forget that new marketing guy came from a competitor, and is secretly still working with that competitor by selling spatial data from the demographics firm back to his old company for a handsome fee. You can find unscrupulous individuals who will do anything to advance the position of their company and gain them a competitive advantage to do business, just about anywhere. That person could be your co-worker who you go to lunch with every day to gossip about the daily events. It could be your best friend who comes over to your house with his wife and their kids for an afternoon barbecue. The point is that it could be anyone. In today s world, we must trust very little, but have enough confidence in our abilities and practices so that we don't worry about it too much.
6 Oracle DB Management for SAs 6 of 45 Sensitive Data :Examples of what might be considered sensitive data Enterprise Information Enterprise Information Financial: Medical groups Banks - Customer accounts Educational: - Students' grades Savings and loans - Credit ratings Universities - Personal information about students Insurance Colleges Credit reporting Military: - Emer gency procedures Industrial: - Secret weapons Manufacturing - Characteristics and announcement dates of new - Numbers and distribution of military personnel products Mining - Production processes Commercial: Medical: Retail sales -Mailing lists Hospitals Medication data Distribution - Selling strategies Clinics Patients' health histories Airlines: - Reservations These are just a few of the types of enterprise sensitive data. Obviously there are a lot more general and site specific types of sensitive data.
7 Oracle DB Management for SAs 7 of 45 Aspects to Security Legal, social and ethical aspects Physical controls Policy questions Operational problems Hardware controls Operating system security Database administration concerns There is no doubt that security is a very broad issue. Some of the foundations upon which you must build a security model are: Legal, social and ethical aspects - Are the monitoring and authorization plans legal in your state, county, country? Are you violating ethics (reading private , system usage, web surfing)? Physical controls - Is the system site secure. Can someone take the actual disks on which your data is stored easier than trying to break into the system? Policies - Does your company have an acceptable use policy? Do you have a service level agreement with the managers that you have to meet? Operational problems - are sections of the database in Antartica? Hardware controls - is this version of the CPU board secure? Is there a hardware security bug in the ethernet card? Operating system security - You should be very familiar with these concerns. Database adminstration concerns - Do all the triggers work? Are the grants correct?
8 Oracle DB Management for SAs 8 of 45 OS vs. Database Security More objects must be protected in a database The lifetime of the data is normally longer in a database Database security is concerned with a higher level of granularity, such as table, row, or cell In database systems objects can be complex logical structures, a number of which might map to the same physical data objects Database security is concerned with the semantics of data, as well as with its physical representation.
9 Oracle DB Management for SAs 9 of 45 Operating System Security To get local access to the database first must go through the server OS - OS security is entirely by-passed when the database is accepting remote connections First step in securing the database is securing the server at the OS level: - TCP Wrappers - Good passwords - etc. Obviously the server itself is a target point for any security violations. Hence, make sure it is secure. Later in this course we ll discuss the remote connection possibilities. For now we are going to explore only a local user connection from the OS. There are a lot of things that can be done. But, there are small easy steps that cover a lot of ground like: security patches, TCP wrappers, good passwords, no open accounts, etc.
10 Oracle DB Management for SAs 10 of 45 Database Security Layers * User * Physical Security * User Application Session Encryption * Transaction Control Program - Login, Menus * DBMS User Views - SQL - GRANT, REVOKE Operating System - File Management System Data Block Encryption * Database Depending on how paranoid you may be you can have all or some of these layers. In general you will always have the user, physical, application, DBMS user and database layers. The rest are mostly optional. Starting with the user (without whom we d all be out of work) we first look at physical security. Physical security consists of doors, locks, card key entries etc. Physical security is to ensure that the computers and peripherals do not just walk off. If I wanted to attack your database I d first check the simple things, like how secure is your hardware. If I can just walk off with the necessary disks and mount them on my own computer elsewhere I will. Then I would have all the time I needed to analyze your database and figure out how to get what I want out of it. Next is the application being run. Whether you are using home grown applications or off the shelf products there is some security and integrity controls built into the application. The amount of security in this layer will vary wildly based on what it is. Next is a possible encryption of the connection to the database (e.g. products like HTTPS or SSH). Next is the transaction control layer, which is the application and OS layer on the server. Like the user application end the amount of security in this layer will depend on what is being used. Generally this layer is better designed for security then the user application layer. Next is the DBMS itself. Oracle has extensive security option built in. But, they are only as effective as they are implemented. Next is the OS again. This layer is the kernel level of the OS. This layer is the controls and access to the actual physical devices. The one that is almost always present is the file system. This layer may not be present if you are using raw devices. Next is additional encryption. This is not easy to implement. If this layer is present it would offset the security risk of someone walking off with the physical drives only. Finally is the actual database itself. Security here is dependent on design (layout).
11 Oracle DB Management for SAs 11 of 45 Security Mechanisms External procedures: Security clearance of personnel, Protection of passwords, Information classification and security policy formulation, Application program controls, Audit Physical environment: Secure areas for files/ processors/ terminals, Radiation shielding Data storage: Data encryption, Duplicate copies Processor software: Authentication of user, Access control Threat monitoring, Audit trail of transactions Processor hardware: Memory protection, States of privilege, Reliability Communication lines: Data encryption Just as a few examples of possible mechanisms.
12 Oracle DB Management for SAs 12 of 45 Definitions It is difficult to talk security without some specific, agreed upon definitions: Information security- is the protection of information against unauthorized disclosure, alteration or destruction Database security- is the protection of information that is maintained in a database Privacy- term used broadly for all the ethical and legal aspects of personal data systems - systems that contain information about individuals
13 Oracle DB Management for SAs 13 of 45 Definitions 2 Authorization- is the specification of access rules about who has what type of access to what information Authoriser- is the person who writes access rules Protection- is the term that refers primarily to techniques that control the access of executing programs to stored information System integrity- is the ability of a system to operate according to specifications even in the face of deliberate attempts to make it behave differently
14 Oracle DB Management for SAs 14 of 45 Definitions 3 Access control- The process of ensuring that information and other protected objects are accessed only in authorized ways Intentional resolution- aims at controlling the actions performed on the data once it is legally accessed Information flow control- aims at preventing security leakage as information flows through the computer system
15 Oracle DB Management for SAs 15 of 45 Definitions 4 Integrity- term that is also applied to data and to the mechanisms that help to ensure its correctness Semantic integrity- is the part of data integrity concerned with the correctness of database information in the presence of user modifications Data security and integrity are also objectives of auditing, which is the examination of information by persons other than those who produced the information
16 Oracle DB Management for SAs 16 of 45 Security vs. Integrity The User Information Modification SECURITY VIOLATION (unauthorized modification) No Security Violation (authorized modification) No Modification Correct possible (usually doesn t Exist) Inadvertently Incorrect Maliciously Incorrect Correct INTEGRITY VIOLATION No INTEGRITY VIOLATION I have been blind sided by someone asking me to define the relationship between security and integrity. After an hour debate on what the definitions were I was then told that I didn t have a clue and that they were the same. After another hour debate we had made no progress. So I was forced to remove the definitions and use the term "security" generically throught the security policy docuement. (The debate was with my boss. So obviously you knew who was going to win from the beginning. However, I felt obligated to try.) This diagram was sent to me some time ago by a some I told this story to. I do not remember who sent it. But, I am enternally grateful to whomever originally made it. Also, I am now ready to win the next debate on this subject! In this diagram the security violations are at the second level. The path from a security violation to a modification is through an error in the security constraints on the database. Hence, although it was a security violation the change was allowed.
17 Oracle DB Management for SAs 17 of 45 Database Security Categories Oracle database security can be generally classified into two distinct categories: System security Data security. System security is NOT operating system security. It is specifically the internal database operating system. Remember Oracle is an operating system unto itself. Data security includes integrity.
18 Oracle DB Management for SAs 18 of 45 DBMS System Security DBMS system security includes the mechanisms that control the access and use of the database at the DBMS s system level. DBMS System security includes: valid username/password combinations the amount of disk space available to the objects of a user the resource limits for a user DBMS System security mechanisms check: whether a user is authorized to connect to the database whether database auditing is active which system operations a user can perform So if the Oracle is an operating system onto itself, it must have an underlying kernel of OS type instructions. This is where process controls, CPU usage, and security are implemented. The security mechanisms are present for all operations. This is the same as trying to use UNIX to create a new directory. The UNIX kernel checks if your UID is valid, if your UID or GIDs have access privileges to the directory of the nature to allow the requested modification. It then performs the operation or issues an error (which is semi auditing). Remember that the database is a little more granular than a normal OS.
19 Oracle DB Management for SAs 19 of 45 Data Security Data security is the mechanism that control the access and use of the database at the object level. Data security includes: which users have access to a specific schema object and the specific types of actions allowed for each user on the object (for example, user ARTRA can issue SELECT and INSERT statements but not DELETE statements on the EMPLOYEE table) the actions, if any, that are audited for each schema object This is the normal nature of security which most people are comfortable with and understand pretty well. Remembering that the database acts similiar to an OS with a high degree of control the data security mechanism is similiar to read and modify access to a file system. The data security mechanisms are present for all operations. This is the same as trying to use UNIX to list a directory. The UNIX kernel checks if your UID is valid, if your UID or GIDs have access privileges to the directory of the nature to allow the requested read operation. It then performs the operation or issues an error (which is semi auditing).
20 Oracle DB Management for SAs 20 of 45 Database Security Access controls include individual users as well as the "general public" (all users defined in Oracle) Data access is controlled by means of granting permissions on tables, views, and database procedures to a user Specific DBA objects (forms, reports and graphs) are public access The DBA can grant permissions on any databases, tables, views or database procedures Oracle has sophisticated security mechanisms, which enable the DBA to control access to sensitive data by an assortment of privileges. The granting of permissions on tables, views, and database procedures to a user is based on the name the user uses to connect to the database. A useful list of DBA objects and reports (views etc.) are granted select priviliges to PUBLIC. This means that any user that can connect to the database can access these objects. This provides a nice working environment from the start. The DBA account is like the root account for UNIX, there is little it can not do. Remeber, in Oracle there is more than one DBA account, there is system, sys, and others that might be defined at your site.
21 Oracle DB Management for SAs 21 of 45 Oracle Security Oracle, a multi-user database system, security features control how the database is accessed and used. Oracle security mechanisms do the following: prevent unauthorized database access prevent unauthorized access to schema objects control disk usage control system resource usage (such as CPU time) audit user actions Associated with each Oracle user is a schema by the same name. By default, each database user creates and has access to all objects in the corresponding schema. Oracle is a full multi-user database system. As such is contains numerous security features to control how data is accessed and manipulated. The security mechanisms provide the tools with which you can impliment your security policies. The user schema, as discussed earlier in this course, is a logical collection of objects (tables, views, sequences, synonyms, indexes, clusters, procedures, functions, packages, and database links) that are associated (owned) by the database user.
22 Oracle DB Management for SAs 22 of 45 Database Users User accounts allow access to the database They should provide for - a secure connection - useful access - adequate privileges to work - proper default settings Users are created in Oracle using the CREATE USER command. It allows for setting the password, default tablespace, temporary tablespace, quota, and profile. If the optional settings are not specified the default values are used. Revoking users is as easy as a DROP USER artra CASCADE; The CASCADE can be dangerous since it removes all objects in the database owned by the user. Oracle prevents unowned objects by explicitly not allowing you to drop a user unless that user no longer owns any objects or unless you specify the CASCADE option. Since CASCADE removes all object from the user s schema it might be far more reaching than you might have believed. In short, review the users schema before running a drop user with cascade.
23 Oracle DB Management for SAs 23 of 45 Database Roles Named collection of privileges May be assigned to a user, or another role Roles are NOT users (can not login to database) Group logically associated privileges and allow privileges to be passed on by reference If role is altered or dropped all users who have the role are emmidiately effected Very much like a UNIX group (including role passwords) Excellent security mechanism Roles in the Oracle database act something like groups in the UNIX realm. Except that Roles can be granted privileges far in excess of anything a UNIX group could dream of doing. Oracle provides for easy and controlled privilege management through roles. Roles are named groups of related privileges that are granted to users or other roles. The following properties of roles allow for easier privilege management: reduced granting of privileges - Rather than explicitly granting the same set of privileges to many users, a database administrator can grant the privileges for a group of related users granted to a role. Then the database administrator can grant the role to each member of the group. dynamic privilege management - When the privileges of a group must change, only the privileges of the role need to be modified. The security domains of all users granted the group s role automatically reflect the changes made to the role. Roles, like UNIX groups, allow you to require a password to activate the role privileges. But, unlike UNIX the roles contain the privileges as well as the objects having access privileges for specific roles (or groups).
24 Oracle DB Management for SAs 24 of 45 Oracle System Level Roles A Role is a job or access privileges Oracle 7 expanded CONNECT, RESOURCE & DBA Roles into 80 plus privileges Privileges can be grouped together into Roles Roles can be granted to users So now there are Roles called CONNECT, RESOURCE, & DBA (plus more) that have all the same privileges associated to them With GRANT allows blessings to occur For each kind of activity in Oracle there is an associated Privilege. Each Privilege can be individually assigned to a User OR to a Role. Then the Roles can be associated to the Users thus granting a whole slew of Privileges in one association. If a Role or Privilege is GRANTed to a User or Role there is an optional clause with grant that can be tacked onto the command. This allows that user or role to grant the privilege or role to other users or roles. The allows for delegation of some duties. Oracle maintains a hierarchical tree mapping of the grants so that the user who granted cannot be altered by someone she granted the privileges to. Hence the DBA account SYS cannot be altered by any other account except for itself.
25 Oracle DB Management for SAs 25 of 45 User Profiles Profiles are like Roles except they deal with resources like: - SESSIONS_PER_USER - CPU_PER_SESSION - CPU_PER_CALL - CONNECT_TIME - IDLE_TIME - etc. A user profile is a means to build up resource controlling limits into a single profile that can then be assigned to users. This allows for keeping road hog users under control. It is worth knowing that profiles are reactive not proactive. So, for instance, a user launches a rather badly formed query. The system will chug away at the poor query until a limit is hit then the query will halt.
26 Oracle DB Management for SAs 26 of 45 Authorisation / Privileges A user may have several forms of authorization on parts of the database (object privileges): Select, Insert, Update, and/or Delete authorization A user may be granted authorization to modify the database scheme (system privileges): Index, Resource, Alteration, and/or Drop authorization A user may be granted the authorization to share the authorization(s) with other users (WITH GRANT OPTION, WITH ADMIN OPTION) A privilege is a right to execute a particular type of SQL statement. Some examples of privileges include the: right to connect to the database (create a session); right to create a table in your schema; right to select rows from someone else s table; and right to execute someone else s stored procedure. The privileges of an Oracle database can be divided into two distinct categories: System Privileges allow users to perform a particular systemwide action or a particular action on a particular type of object. For example, the privileges to create a tablespace or to delete the rows of any table in the database are system privileges. Many system privileges are available only to administrators and application developers because the privileges are very powerful. Object privileges allow users to perform a particular action on a specific object. For example, the privilege to delete rows of a specific table is an object privilege. Object privileges are granted (assigned) to end users so that they can use a database application to accomplish specific tasks. There are only 16 Object privileges in Oracle version A complete list of object privileges can be found in the data dictionary table TABLE_PRIVILEGE_MAP. Object privileges allow a user the right to manipulate the data within the object or, in the case of programs, to execute the program. These privileges are usually refered to as grants and are object specific. A user granted insert on Leeland s mass spectrum table does not automatically have any privileges on any other table owned by Leeland or anyone else. There are more than 80 system privileges available to authorise users in Oracle. The number of privileges will vary depending on the Oracle version being used. A complete list of privileges can be found in the Oracle data dictionary table called SYSTEM_PRIVILEGE_MAP. System privileges do not convey any rights for data access. Although a user may be able to create any view in any other user s schema, the new view will be owned by the user who s schema was specified. The creating user will still not be able access the view after it is created.
27 Oracle DB Management for SAs 27 of 45 Granting Privileges Normally a DBA responsibility Grants can range from very general to very specific The grant statement is used to grant privileges. The general form is: GRANT privilege ON object TO whom [WITH GRANT OPTION] whom can be: Individual users PUBLIC A defined role The granting of privileges (also called permissions, grants, or permits) is normally a DBA responsibility. Privileges are granted to users so that users can access and modify data in the database. A user can receive a privilege in two different ways: Privileges can be granted to users explicitly. For example, the privilege to insert records into the EMPLOYEE table can be explicitly granted to the user ARTRA. Privileges can be granted to roles, and then the role can be granted to one or more users. For example, the privilege to insert records into the EMPLOYEE table can be granted to the role named CLERK, which in turn can be granted to the users ARTRA and ADAMS. A privilege that is granted using the WITH GRANT OPTION can be passed on to other users and roles by the grantee. If the grant includes WITH GRANT OPTION, the grantee can further grant the object privileges to the object privileges to other users. Object privileges granted WITH GRANT OPTION are revoked when the grantor s privilege is revoked. A privilege WITH GRANT OPTION cannot be granted to roles (discussed later).
28 Oracle DB Management for SAs 28 of 45 Displaying DBA Object Privileges Available to DBA DBA_TAB_PRIVS DBA_COL_PRIVS Description All privileges on objects in the database All privileges on columns in the database
29 Oracle DB Management for SAs 29 of 45 Displaying User Object Privileges Available to the User Description USER_TAB_PRIVS Privileges on objects for which the user is the owner, grantor, or grantee USER_TAB_PRIVS_MADE All privileges on objects owned by the user USER_TAB_PRIVS_RECD Privileges on objects for which the user is the grantee USER_COL_PRIVS Privileges on columns for which the user is the owner, grantor, or grantee USER_COL_PRIVS_MADE All privileges on columns of objects owned by the user USER_COL_PRIVS_RECD Privileges on columns for which the user is the grantee
30 Oracle DB Management for SAs 30 of 45 Displaying Object Privileges Available to ALL users ALL_TAB_PRIVS ALL_TAB_PRIVS_MADE ALL_TAB_PRIVS_RECD TABLE_PRIVILEGES ALL_COL_PRIVS ALL_COL_PRIVS_MADE ALL_COL_PRIVS_RECD COLUMN_PRIVILEGES Description Privileges on objects for which the user or PUBLIC is the grantee User s privileges and privileges on user s objects Privileges on objects for which the user or PUBLIC is the grantee Privileges on objects for which the user is teh grantor, grantee, or owner, or PUBLIC is the grantee Privileges on columns for which the user or PUBLIC is the grantee Privileges on columns for which the user is the owner or grantor Privileges on columns for which the user or PUBLIC is the grantee Privileges on columns for which the user is the grantor, grantee, or owner, or PUBLIC is the grantee Yes it is a bit dense. But, I wanted to get it all onto the one slide. Luckily you can look it up and read it.
31 Oracle DB Management for SAs 31 of 45 Removing (Revoking) Privileges DBAs can revoke any privilege(s) from any user Grantors can revoke privileges from users to whom they have granted privileges The revoke statement is used to remove privileges. The general form is: REVOKE privilege ON object FROM whom [CASCADE CONSTRAINTS] whom can be: Individual users PUBLIC A defined role The revoke statement is very similar to the grant statement. The notable difference is the ending option CASCADE CONSTRAINTS, which is the option to revoke references privileges. This means that the revoke will also walk through all constraints on the tables to make sure than the changes do not have any references if so they too shall be revoked. If a privilege is revoked from a user and that user had granted the privilege to other users then the other users will also loose the privileges as well.
32 Oracle DB Management for SAs 32 of 45 Tying Database Accounts to the OS Oracle is an OS on a OS Oracle can use the Server s OS to identify a user The Oracle account must be specially named The name prefix can be specified (or NULL) The OS authentication is based on the client HOST not the Server Can open up some security holes Oracle is an OS unto itself. But, it must run on another OS. So users must identify themselves to Oracle with a username and a password. But, Oracle can check with the Server s OS for valid account data. Then the User can just connect. To set up this connection you create a user account with a special prefix identified by the Oracle parameter OS_AUTHENT_PREFIX. Then Oracle allows that user (who is already connected) to simply place a slash / in place of their username/password combination. However, in creating a user account a password has to be specified. So someone can still connect directly to Oracle using the oracle_username/password combination. This can be bypassed by setting an impossible password (see passwords). Or you can prevent this by specifying the IDENTIFIED EXTERNALLY clause which causes oracle to check the account you are coming from against the user account you are trying to connect to. If they do not match the connection is refused.
33 Oracle DB Management for SAs 33 of 45 Oracle Passwords Protect accounts from unauthorized access Cryptographically stored DBAs can become other USERS Set in the CREATE USER and ALTER USER commands Can be set for ROLES Validated like UNIX passwords Can be specifically set using VALUES clause The user account passwords are every bit as important as the Server OS level passwords. They provide for a level of authentication that the person accessing the account has the privilege to do so. Oracle passwords are encrypted similar to UNIX passwords. The cryptographic hash is stored in the data dictionary. Knowing how the passwords are stored makes for some interesting abilities. For example the DBA could view the data dictionary table dba_users and save off the password hash. Then they can set the password for that account to anything they want using the ALTER USER <soandso> IDENTIFIED BY cheat ; Now they can log onto that account all they want. When they are finished they can reset the password to what it was by issuing the command ALTER USER <soandso> IDENTIFIED BY VALUES CRYPTOGRAPHICHASH ; and everything is back to normal. Passwords may be assigned to ROLES. This causes the password to be required whenever the user attempts to shift to that ROLE for a privilege. Passwords are collected and encrypted then the resulting hash is compared to the stored value like UNIX password authentication. The fact that Oracle authenticates passwords like this means, that by using the VALUES clause, impossible passwords can used to replace usable passwords (e.g. no way ). This combined with the System OS authentication would cause each user to only connect from the local machine when they are logged in as themselves.
34 Oracle DB Management for SAs 34 of 45 Remote Account Access Allowing remote connections opens up potential hazards With remote connections the OPS$ account alters flavor Account names being the same a remote user can access a local user s account in Oracle If a user is a DBA on a remote host they can connect internal to your host At least turn off SQL*Net OPS$ connections Once you activate the SQL*Net listener you open up a whole slew of additional considerations. You must consider the network connections and their implications. If you have remote database links, and are using the OPS$ host account linking, a connection s authentication then comes into question. Should the OPS$ name of the originating account be checked against the local OS or the remote OS. If a user with multiple accounts, all the same name connects through SQL*Net using the / identifier it will pass without a problem. But, if an entirely different user on another host has the same username as the local user then that alternate user can connect just as easily bypassing all the security. This gets even more hair raising when you think about a remote user with DBA privileges. That user can use the connect internal clause on their machine against the local host and get a connection with complete DBA authority. This can be stopped by specifying to the SQL*Net listener orasrv dbaoff opsoff. This will turn of remote DBA connections and remote OPS$ connections.
35 Oracle DB Management for SAs 35 of 45 Using Views for Security Views can be thought of as a means of providing a user with a "personalized" model of the database. A view: can hide data that a user does not need to see is assembled with the permissions of the owner of the view not the user executing the query A view s ability to hide data serves both to simplify usage of the system and to enhance security. Oracle definitions of views are assembled with the permissions of the owner of a view. Access to views is the same as access to tables. So if sensitive data needs to be hidden while other data needs to be published a view is an excellent mechanism to meet this requirement. So although a user may be denied direct access to a relation, the user may be able to access part of that relation through a view.
36 Oracle DB Management for SAs 36 of 45 Using Roles for Security Protecting objects with roles reduces a large security problem 3rd party (or in house) applications are designed to protect data integrity (usually by extra security ) Instead of managing security in the application use password protected roles Applications can have an internal password or query user for password to set a role: SET role IDENTIFIED BY password Permissions end when application terminates Most software products are designed so that a user must provide some user name and password in order to access data within the database. One of the most common mistakes made when deploying a new application to users resides in letting the client-side application code manage privileged access to specific data, as well as maintain much of the data's integrity. This should be a major concern for security conscious administrators. What would happen if a user were to connect to the database from Microsoft Access, SQL*Plus, or some other 3rd party product? Even the best of intentions can wreak awesome havoc. Or even worse, what might happen if someone were to hijack another's username/password combination, and interact with the database outside the bounds of a seemingly protective desktop application? The possibilities are quite imaginable for those of us with a little experience. Critical data + vulnerability = Disaster! It is not good enough to manage user access to database objects simply through a software application. By taking advantage of password protected roles, we can eliminate some of the worry. The idea is that an application will have a standard user login window where the user will supply a name and a password. This will be good enough to connect them to the database. Once the user is connected, and before any SQL on application objects is executed, the application uses an internal or asks for a password that will set a given Role, thus giving them access to the necessary objects. When the user ends the session (i.e. exits the application), they will no longer have access to any of those database objects. When the role is set, the privileges acquired are only good for the user s session. Once the user s session ends, or when a user exits an application, the role is terminated. To implement this in an application is very simple. Once the user logs into the application via a login name and password (connecting them to the database), a statement is executed to set the role providing a password. When the user exits the application, they will no longer have access to those objects. This method closes a gaping hole in security as users will attempt to gain access to database objects only to find they must enable a role that must be accompanied by a password.
37 Oracle DB Management for SAs 37 of 45 Common Security Holes SYSTEM user password = "manager" SYS user password = "change_on_install" connect internal/oracle = SYS user access Too much access to data dictionary (DBA.ALL_USERS view) DBA privileges assigned to development or 3rd party users The SYS and SYSTEM users are the most obvious holes, and should be the first holes to fix. The SYSTEM user has a default password of "manager". That's easy enough to change. What about the SYS user whose password is "change_on_install". I have gotten in a few times through SYS. So if your SYS and SYSTEM users still have those same passwords, change them now and on a regular basis. Keep track of what those passwords are as well. If you forget them, your in some pretty hot water. The next item of concern is the INTERNAL connection through server manager. I am rarely surprised when a connect internal/oracle gets me in as the user SYS with full privileges to do whatever I want. I've met a lot of DBAs who say "Oh, well, I guess I can't change the Internal password unless I recreate the database.. and by the way, who knows about it anyway?". That is totally wrong (as of Oracle8...;^), you can change the internal password very easily without causing any harm to the database, or network connectivity for clients. To change the Internal password do the following: Delete the SID: ORADIM80 -DELETE -SID sid (i.e. sid: PROD, etc.) Create the SID again and specify the new Internal password after the keyword INTPWD: ORADIM80 -NEW -SID sid -INTPWD password -STARTMODE auto -PFILE <database root>/ database/init<sid>.ora Log in to server manager and connect... internal/<new_password> Another very common mistake is that a user has access to much of the data dictionary, especially the view ALL_USERS. By examining that view someone might see other users who might have DBA roles. For example the view may reveal a user like the CONTEXT cartridge user (identified by the CTXSYS user being present). The CTXSYS user needs the DBA role, and has a default password of ctxsys (another common mistake). Along the same lines are the DBAs who think that one of the ways to keep users/developers from knocking on their door with minor problems or complaints about not enough privileges and how they need them to do this or that, is to grant them the DBA role.
38 Oracle DB Management for SAs 38 of 45 Evaluating Security in Oracle The grant statement and the permission system allow for data access to be restricted in the following ways: Operational restrictions (select, insert, update and delete permissions applied to some or all of the columns of a table) Restrictions by data value. These are implemented via views. Resource restrictions. These are the optional database privileges. The Oracle Server provides discretionary access control, which is a means of restricting access to information based on privileges. The appropriate privilege must be assigned to a user in order for that user to access an object. Appropriately privileged users can grant other users privileges at their discretion; for this reason, this type of security is called discretionary. Oracle manages database security using several different facilities: database users and schemas privileges roles storage settings and quotas resource limits auditing Think very hard about what privileges and roles you grant your users. Understand what it means to assign roles to users. Most often CONNECT, and RESOURCE will be more than enough on development servers, and usually way more for users who log into the database through applications to insert new spatial data, or post transactions to the cost-accounting systems. There are a very diverse set of ways to skin this cat. With all the options available it can be easy to meet most security and integrity requirements. However, it is also easy to overlook a mistake that might disclose more privileges than expected. The Oracle security system is complex and diverse, so try to keep the complexity down. The simple rule of keep it simple applies very well to Oracle databases.
39 Oracle DB Management for SAs 39 of 45 Questions on Security?
40 Oracle DB Management for SAs 40 of 45 Security Summary The DATA in the database is the most important asset Security should be used to ensure data consistency and distribution User Account, Privileges, Roles and Profiles are available to provide required security controls If networking is turned on for the database then ensure its configuration meets the security plan Networking only works if the proper listener is turned on
41 Oracle DB Management for SAs 41 of 45 And To You This is really your time to ask what ever question you like on Oracle, your site, etc.
42 Oracle DB Management for SAs 42 of 45 Credit where Credit is Due This talk would not be in the great shape it is in without the generous help of: Curtis Presten, Collective Technologies (God of backups be praised!) O Reilly & Associates (my book shelves are quite the menagerie ever since they started!) David Evans, Systems Administrator (a true friend indeed) Dr. Andrea Evans, Lecturer, Deakin University (who s insightful comments kept me up at night wondering if I should even open my mouth) Hal Miller, Senior Systems Administrator (for all the put downs to keep my ego in check) Many others who took the time to provide great feedback!
43 Oracle DB Management for SAs 43 of 45 Please Contribute Although this is the end of this presentation, it is not the end of this talk. Even if you don t have anything specific Please remember to fill out the Speaker evaluation forms Remember Leeland Artra: 10,10,10,10,10,10
44 Oracle DB Management for SAs 44 of 45 Bibliography This talk was assembled from in no particular order: "Oracle DBA Handbook" 7.3 Edition, by Kevin Loney; McGraw Hill; ISBN "Oracle Database Backup" by Curtis Preston; July, 1996 Sys Admin. Magazine. "Oracle7: Administrators" course; Oracle Training. "Oracle7: Database Backup and Recovery" course; Oracle Training. "Oracle Security", by Marlene Theriault & William Heney, O Reilly 1998.
45 Oracle DB Management for SAs 45 of 45 Bibliography 2 "Oracle7 Administrator s Reference for UNIX" release 7.3, Oracle Corporation. "Oracle7 Installation Guide for MIPS ABI Systems" release 7.3, Oracle Corporation. "Oracle Unleashed" Second Edition; Sams Publishing; ISBN And a whole lot of not-so-fun-at-the-time trouble shooting, installations, and other calamities of the school of hard knocks.
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
New Security Options in DB2 for z/os Release 9 and 10
New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills
Identity Management and Access Control
and Access Control Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
Why You Need Email Archiving
Why You Need Email Archiving www.exclaimer.com Table of Contents Introduction...2 The IT Administrator...3 The Email User...5 The Team Leader...6 The Senior Manager/Business Owner...7 Conclusion...8-1
White Paper - Crypto Virus. A guide to protecting your IT
White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Oracle Security on Windows
Introduction - commercial slide. UKOUG Windows SIG, September 25 th 2007 Oracle Security on Windows By Pete Finnigan Written Friday, 07 September 2007 Founded February 2003 CEO Pete Finnigan Clients UK,
Database and Data Mining Security
Database and Data Mining Security 1 Threats/Protections to the System 1. External procedures security clearance of personnel password protection controlling application programs Audit 2. Physical environment
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle
Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle Introduction I ve always been interested and intrigued by the processes DBAs use to monitor
Database Security. Chapter 21
Database Security Chapter 21 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can t see other students grades. Integrity: Users should
CMP3002 Advanced Web Technology
CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...
PATROL From a Database Administrator s Perspective
PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks
Microsoft SQL Server Security & Auditing. March 23, 2011 ISACA Chapter Meeting
Microsoft SQL Server Security & Auditing March 23, 2011 ISACA Chapter Meeting Agenda Introduction SQL Server Product Description SQL Security Basics Security System Views Evolution of Tool Set for Auditing
State of Wisconsin Database Hosting Services Roles and Responsibilities
State of Wisconsin Hosting Services oles and esponsibilities Document evision History (Major Post Publishing evisions Only) Date Version reator Notes 12/9/2010 1.0 This document describes the Hosting Services
Implementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
Database Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
RACK911 Labs. Year in Review. May 6, 2014
RACK911 Labs Year in Review May 6, 014 The security of the hosting industry has always been a concern of RACK911 and in May of 013 we decided to take a more proactive role by creating a new brand called
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-
Oracle Objective: Oracle has many advantages and features that makes it popular and thereby makes it as the world's largest enterprise software company. Oracle is used for almost all large application
CribMaster Database and Client Requirements
FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Migrate Topaz databases from One Server to Another
Title Migrate Topaz databases from One Server to Another Author: Olivier Lauret Date: November 2004 Modified: Category: Topaz/BAC Version: Topaz 4.5.2, BAC 5.0 and BAC 5.1 Migrate Topaz databases from
Database Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
ADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
16 Common Backup Problems & Mistakes
16 Common Backup Problems & Mistakes 1. Tape errors, Tape Drive failures. Probably the number one backup problem is simply caused by the unreliability of tape. Tape drives have a higher failure rate than
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Security Target for. Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065
Security Target for Oracle Database 11g Release 2 (11.2.0.2) Standard Edition and Standard Edition One October 2011 Version 1.3 Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores,
4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.
Topic 8 Database Security LEARNING OUTCOMES When you have completed this Topic you should be able to: 1. Discuss the important of database security to an organisation. 2. Identify the types of threat that
Chapter 2: The hidden flaws in Windows
ebook C-level guide to defense in depth Chapter 2: The hidden flaws in Windows Sami Laiho, MVP Windows Expert Contents Synopsis 3 About the author 4 The hidden flaws in Windows 5 Getting rid of administrative
SSL. Secure Sockets Layer. - a short summary - By Christoph Gutmann and Khôi Tran
SSL Secure Sockets Layer - a short summary - By Christoph Gutmann and Khôi Tran Page 1 / 7 Table of contents 1. Brief historic outline of SSL 2. Why did SSL come to life? 3. How does SSL work? 4. Where
General DBA Best Practices
General DBA Best Practices An Accelerated Technology Laboratories, Inc. White Paper 496 Holly Grove School Road West End, NC 27376 1 (800) 565-LIMS (5467) / 1 (910) 673-8165 1 (910) 673-8166 (FAX) E-mail:
Configuring an Alternative Database for SAS Web Infrastructure Platform Services
Configuration Guide Configuring an Alternative Database for SAS Web Infrastructure Platform Services By default, SAS Web Infrastructure Platform Services is configured to use SAS Framework Data Server.
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
The Ultimate Remote Database Administration Tool for Oracle, SQL Server and DB2 UDB
Proactive Technologies Inc. presents Version 4.0 The Ultimate Remote Database Administration Tool for Oracle, SQL Server and DB2 UDB The negative impact that downtime can have on a company has never been
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Managing Special Authorities. for PCI Compliance. on the. System i
Managing Special Authorities for PCI Compliance on the System i Introduction What is a Powerful User? On IBM s System i platform, it is someone who can change objects, files and/or data, they can access
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
Fixing Common Problems in Data Storage - A Review
Security Design For Your Database Applications Least privilege, data and ownership 1 Legal Notice Security Design For Your Database Applications Published by PeteFinnigan.com Limited 9 Beech Grove Acomb
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Oracle Database Vault: Design Failures
Oracle Database Vault: Design Failures What is Database Vault? Helps protecting against insider threats even when these comes from privileged database users (SYS) Mandatory in certain countries: laws Can
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
Restore and Recovery Tasks. Copyright 2009, Oracle. All rights reserved.
Restore and Recovery Tasks Objectives After completing this lesson, you should be able to: Describe the causes of file loss and determine the appropriate action Describe major recovery operations Back
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Defense In-Depth to Achieve Unbreakable Database Security
Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
DBMS Questions. 3.) For which two constraints are indexes created when the constraint is added?
DBMS Questions 1.) Which type of file is part of the Oracle database? A.) B.) C.) D.) Control file Password file Parameter files Archived log files 2.) Which statements are use to UNLOCK the user? A.)
BEST PRACTICES FOR UNIX/LINUX PRIVILEGED IDENTITY AND ACCESS MANAGEMENT
WHITE PAPER PIM, PAM and PUM BEST PRACTICES FOR UNIX/LINUX PRIVILEGED IDENTITY AND ACCESS MANAGEMENT Fox Technologies, Inc. www.foxt.com [email protected] 616.438.0840 PIM, PAM and PUM: Best Practices for
Visual Studio.NET Database Projects
Visual Studio.NET Database Projects CHAPTER 8 IN THIS CHAPTER Creating a Database Project 294 Database References 296 Scripts 297 Queries 312 293 294 Visual Studio.NET Database Projects The database project
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
Online Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
Database Extension 1.5 ez Publish Extension Manual
Database Extension 1.5 ez Publish Extension Manual 1999 2012 ez Systems AS Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License,Version
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Server & Workstation Installation of Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
