Oracle Database Security Policy

Source: Internet
Author: User
Tags most popular database
Oracle Database Security Policy

Oracle Database Security Policy

The ORACLE tutorial is: Oracle database security policy.

With the popularization and improvement of computer network applications, Oracle database applications are becoming increasingly popular in various fields. It features excellent performance and flexible operations, making it one of the most popular database systems. However, with the deepening of applications and increasing data information, the database security issue has been raised to a very important agenda. It is a matter of great concern for database administrators in their daily work. Due to computer software and hardware faults, the database system may not work properly, resulting in a large amount of data loss and even database system crash. To this end, I would like to talk about how to ensure high security of Oracle databases and put the database system in a stable and secure State.

User role management

This is an important means to protect the security of the database system. It establishes different user groups and user password verification to effectively prevent illegal Oracle users from entering the database system, causing unnecessary trouble and damage. In addition, in the Oracle database, you can use authorization to restrict the operations of Oracle users, that is, allow some users to access the Oracle server, that is, they have the right to read and write the entire database, most users can only read and write in the same group or have the read right to the entire database. Special emphasis is placed on the confidentiality management of the two special accounts SYS and SYSTEM.

To protect the security of the Oracle server, ensure that the ownership of all content in the $ ORACLE_HOME/bin directory is owned by the Oracle user.
To enhance the security of the database in the network, remote users should use encrypted passwords to access the database, and enhance the DBA permission control on the network, such as rejecting remote DBA access.

Data Protection

Database data protection mainly refers to database backup. When the computer's hardware and software fails, backup is used to restore the database to recover damaged database files, control files, or other files.

Another type of data protection is log. Oracle database instances provide logs to record various operations in the database, including modifying and adjusting parameters, create a complete record for all jobs in the database.

Another is the backup of the control file, which is generally used to store the state of the physical structure of the database. Some state information in the control file is used to guide the Oracle database during instance recovery and media recovery.

Oracle Database Backup

In daily work, database backup is a constant task that the database administrator must perform. Oracle 7 database backup mainly includes the following methods:

1. Logical backup

Logical backup is to read the records of a database and write them into a file. This is a commonly used backup method.

● Export (export): This command backs up a data file, a user's data file, or the entire database.

● Import: This command reads the dump file created by export into the database system. It can also be performed by a data file, user, or the entire database.

[NextPage]

2. Physical backup

Physical backup is often used by database administrators. It can copy all the content of the Oracle database in a variety of ways, including offline backup and online backup. They have their own advantages and should be selected based on the actual situation and status.

● Offline backup

After the Oracle database is shut down normally, it backs up the Oracle database. The backup includes the database files and tables of all users, all control files, and all log files; database initialization files. Different backup methods can be used, such as dumping all files to the tape using the tape dump command (tar), or copying all files as they are (copy, rcp) to another backup disk or another host disk.

● Online backup

This backup method is also effective. It can migrate online logs and create a detailed and accurate full record of all processes and jobs in the Oracle database.

Another advantage of physical backup is that it can completely dump the Oracle database management system. Once a fault occurs, it can be easily and timely restored to reduce the trouble caused by database administrators re-installing Oracle.

Database System Recovery

With the preceding backup methods, you do not have to be alarmed even when a computer fails, such as a media damage or software system exception. You can use the backup method to recover the data to different degrees, restore the Oracle database system to normal as soon as possible.

1. Data File Corruption

In this case, you can use the latest database file backup to restore the corresponding file in the backup to the original location and reload the database.

2. Control File Corruption

If the control file in the database system is damaged, the database system will not be able to run normally. You only need to shut down the database system and restore the corresponding control file from the backup to the original location, restart the database system.

3. The entire file system is damaged.

In large operating systems, such as UNIX, the entire Oracle database system crashes due to the unreliable or damaged media on disks or disk arrays, which can only be:

● Reinitialize the disk or disk array to Remove invalid or unreliable Bad blocks.
● Recreate the file system.
● Use backup to completely restore the database system.
● Start the database system.

The above aspects are my understanding and experience on the Management and Application of the Oracle database system in my daily work. In short, there are still many security technologies and measures to be summarized, so that our database system can run more efficiently and securely.

[NextPage]

Previous Page

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.