HOME
SEARCH
BLOG
SCRIPTS
CONTACT
SEARCH
SEARCH
Disclaimer:
Authors have full rights over their works. Reproduction of any part of the content is prohibited without prior authorization.
×
BOOK ORACLE 11G ANTI-HACKERS COOKBOOK
DOWNLOAD
SUMMARY
Items Found:
75
Preface 1
Chapter 1: Operating System Security 7
Introduction 7
Using Tripwire for file integrity checking 9
Using immutable files to prevent modifications 19
Closing vulnerable network ports and services 21
Using network security kernel tunables to protect your system 25
Using TCP wrappers to allow and deny remote connections 27
Enforcing the use of strong passwords and restricting the use of
previous passwords 28
Restricting direct login and su access 33
Securing ssh login 35
Chapter 2: Securing the Network and Data in Transit 39
Introduction 39
Hijacking an Oracle connection 40
Using OAS network encryption for securing data in motion 49
Using OAS data integrity for securing data in motion 58
Using OAS SSL network encryption for securing data in motion 59
Encrypting network communication using IPSEC 66
Encrypting network communication with stunnel 70
Encrypting network communication using SSH tunneling 73
Restricting the fly listener administration using the
ADMIN_RESTRICTION_LISTENER parameter 76
Securing external program execution (EXTPROC) 77
Controlling client connections using the TCP.VALIDNODE_CHECKING
listener parameter 80
Chapter 3: Securing Data at Rest 83
Introduction 83
Using block device encryption 84
Using filesystem encryption with eCryptfs 88
Using DBMS_CRYPTO for column encryption 92
Using Transparent Data Encryption for column encryption 101
Using TDE for tablespace encryption 107
Using encryption with data pump 109
Using encryption with RMAN 114
Chapter 4: Authentication and User Security 119
Introduction 119
Performing a security evaluation using Oracle Enterprise Manager 120
Using an offline Oracle password cracker 128
Using user profiles to enforce password policies 131
Using secure application roles 136
How to perform authentication using external password stores 139
Using SSL authentication 141
Chapter 5: Beyond Privileges: Oracle Virtual Private Database 145
Introduction 145
Using session-based application contexts 146
Implementing row-level access policies 151
Using Oracle Enterprise Manager for managing VPD 161
Implementing column-level access policies 166
Implementing VPD grouped policies 171
Granting exemptions from VPD policies 183
Chapter 6: Beyond Privileges: Oracle Label Security 185
Introduction 185
Creating and using label components 186
Defining and using compartments and groups 198
Using label policy privileges 208
Using trusted stored units 210
Chapter 7: Beyond Privileges: Oracle Database Vault 215
Introduction 215
Creating and using Oracle Database Vault realms 216
Creating and using Oracle Vault command rules 223
Creating and using Oracle Database Vault rulesets 228
Creating and using Oracle Database Vault factors 238
Creating and using Oracle Database Vault reports 243
Chapter 8: Tracking and Analysis: Database Auditing 255
Introduction 255
Determining how and where to generate audit information 256
Auditing sessions 259
Auditing statements 261
Auditing objects 264
Auditing privileges 265
Implementing fine-grained auditing 268
Integrating Oracle audit with SYSLOG 272
Auditing sys administrative users 274
Appendix: Installing and Configuring Guardium, ODF, and OAV