Oracle 9i Security System
1. Security of the physical layer
The node on which the database resides must be physically and reliably protected.
2. Security for the user layer
Which users can use the database, which data objects to use the database, what permissions, and so on.
3. S
Data security is a wide range of topics, including network security, operating system security, Application layer Security and database security, Oracle data security is at the database
Data security is the protection of data to prevent illegal use, to avoid the data intentionally or unintentionally lost, leaked or destroyed. Because of the large amount of data stored in the database system, which is shared by many users, security constraint is a very prominent problem.
The basic measures taken by Oracle database system in implementing database
In the database security configuration, it is necessary to do the related security reinforcement work. To confirm the security of the database, however, sometimes, improper operation or database business account changes password, and the program's connection to the database configuration encapsulated in the jar, if the jar of the connection database configuration
Database security problem has been one of the focus of attention, we know that a business or organization of the database if the hacker attacks, and these databases and the preservation of very important data, such as banks, communications and other databases, the consequences will be disastrous. Oracle databases use a variety of tools to ensure database security
The Oracle tutorial you are looking at is: Oracle Database Security Policy Analysis (iii).
security Policy for data:
Data should be considered based on the importance of data. If the data is not very important, then the security policy of the data can be slightly relaxed
Oracle's security is divided into four parts, namely user management, access control, data protection and monitoring, specific reference to the [Oracle] Database Security Overview http://blog.csdn.net/u010415792/article/details/9008089
One of the most common technologies in Access control today is VPD,VPD virtual Private database, which appears at
certain security risks, if not timely resolution, it is likely to cause data and financial losses, and to make up for such shortcomings, the best way is to use Oracle data security to protect the company's relevant data.When using Oracle data security, first of all, from ou
, table (bed) is placed in each room, Can not be placed outside the room, it is not night to sleep homeless, and then the bed can be placed a lot of items, like the table can be placed on a lot of columns and rows, the database is stored in the basic unit of data is a table, in reality, each warehouse placed in the unit of the object is the bed, The user is the owner of each schema, (so the schema contains object, not user), user and schema are one by one corresponding, each user can only use th
secondsDisadvantagesCan't go wrong, or the problem will be very seriousBackup is unsuccessful and cannot be restored to a point in time3. Virtual Network Technology1.vlanIP-based Port-based technology for MAC addressesLimit broadcast to the scope of each virtual network, thus reduce the transmission of broadcast packets across the network, and improve the transmission efficiency of the network.at the same time, the virtual network can not communicate directly, but must be forwarded through the
;Assigning Database System Privileges1Sql> SelectDESTINCT privilege fromDba_sys_privs;2Sql> Grant CreateSession to user_name#minimally AUserNeedsCREATESESSION toBe able toConnect toTheDatabase.3Sql> RevokeCteateTable from user_name; # toTake awayPrivileges.4Sql> Grant Create Table to user_name withAdminoption; #allows You to GrantA system privilege toAUser andalso give thatUserThe ability toAdminister a privilege. You can does this withThe withADMINOPTIONClause.Assigning Database Object Priv
Oracle's security chief says there are too many software vulnerabilities in the software industry that "if a planet is built by software developers, no one wants to live there." ”
Oracle Security Long Mary Ann Davidson the muzzle of the software industry, she said, "Most software engineers do not consider security and
The Hsql script for the security ACL is only given on the official document of spring security, but spring did not explicitly give the database creation script and configuration instructions when using the Oracle database. The following are the SQL scripts and configurations that you use when you use the Oracle databas
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.