Oracle9i Security Overview Release 1 (9.0.1) Part Number A90148-01 |
|
The Oracle9i Security Overview presents the basic concepts of data security in the Internet age. It outlines fundamental data security requirements and explains the risks which threaten the integrity and privacy of your data. Several chapters introduce the rich array of technology that can contribute to system security. The book concludes with a survey of the Oracle features and products which implement these technologies.
Together, these products have the potential to control access to all the vulnerable areas of your system, and help users and administrators to perform their tasks without jeopardizing the security plan you have put in place.
This preface contains these topics:
The Oracle9i Security Overview is intended for database administrators (DBAs), application programmers, security administrators, system operators, and other Oracle users who perform the following tasks:
To use this document, you need general familiarity with database and networking concepts.
This document introduces the basic concepts of system security in the Internet Age. It outlines the data security risks which are prevalent today, and the industry-standard technologies available to address them. It then presents the carefully integrated suite of Oracle products you can use to implement these security technologies.
This part explains the wide range of security risks to the integrity and privacy of data in the Internet Age.
This chapter introduces the fundamental concepts of data security, and outlines the threats against which data and systems must be defended.
This part introduces the technology available to meet data security challenges.
This chapter describes the fundamental elements of database security.
This chapter explains how data can be protected while being transmitted over a network. It covers network access control, encryption, Secure Sockets Layer, and firewalls, as well as security in a three-tier environment.
This chapter describes the wide range of technology available to verify the identity of database, application, and network users.
It can be advantageous to centralize storage and management of user-related information in a directory. This chapter describes how to protect such a directory, and how access can be controlled using a directory.
This chapter describes the elements which make up a strong enterprise user management facility.
This chapter describes technology available to monitor the effectiveness of your security policies.
This chapter introduces the Public Key Infrastructure (PKI) approach to security. It describes the components of PKI, and explains why this has become an industry standard.
This part presents the rich suite of Oracle security products which can meet your data security requirements.
This chapter presents the major security-related products available with Oracle9i, and specifies the way in which each of them implements the kinds of security technologies described in Part II of this book.
For more information, see these Oracle resources:
In North America, printed documentation is available for sale in the Oracle Store at
http://oraclestore.oracle.com/
Customers in Europe, the Middle East, and Africa (EMEA) can purchase documentation from
http://www.oraclebookshop.com/
Other customers can contact their Oracle representative to purchase printed documentation.
To download free release notes, installation documentation, white papers, or other collateral, please visit the Oracle Technology Network (OTN). You must register online before using OTN; registration is free and can be done at
http://technet.oracle.com/membership/index.htm
If you already have a username and password for OTN, then you can go directly to the documentation section of the OTN Web site at
http://technet.oracle.com/docs/index.htm
This section describes the conventions used in the text and code examples of this documentation set. It describes:
We use various conventions in text to help you more quickly identify special terms. The following table describes those conventions and provides examples of their use.
Code examples illustrate SQL, PL/SQL, SQL*Plus, or other command-line statements. They are displayed in a monospace (fixed-width) font and separated from normal text as shown in this example:
SELECT username FROM dba_users WHERE username = 'MIGRATE';
The following table describes typographic conventions used in code examples and provides examples of their use.
The goal of Oracle Corporation is to make our products, services, and supporting documentation accessible to the disabled community with good usability. To that end, our documentation includes features that make information available to users of assistive technology. This documentation is available in HTML format, and contains markup to facilitate access by the disabled community. Standards will continue to evolve over time, and Oracle is actively engaged with other market-leading technology vendors to address technical obstacles so that our documentation can be accessible to all of our customers. For additional information, visit the Oracle Accessibility Program Web site at http://www.oracle.com/accessibility/.
JAWS, a Windows screen reader, may not always correctly read the code examples in this document. The conventions for writing code require that closing braces should appear on an otherwise empty line; however, JAWS may not always read a line of text that consists solely of a bracket or brace.
|
Copyright © 1996-2001, Oracle Corporation. All Rights Reserved. |
|