z-logo
open-access-imgOpen Access
Database Private Security Jurisprudence: A Case Study using Oracle
Author(s) -
Madhuri N. Gedam,
B. B. Meshram
Publication year - 2021
Publication title -
international journal of database management systems
Language(s) - English
Resource type - Journals
eISSN - 0975-5985
pISSN - 0975-5705
DOI - 10.5121/ijdms.2021.13301
Subject(s) - computer science , database , oracle , database administrator , oracle unified method , database security , pl/sql , view , database schema , computer security , world wide web , database design , query by example , software engineering , web search query , search engine
Oracle is one of the largest vendors and the best DBMS solution of Object Relational DBMS in the IT world. Oracle Database is one of the three market-leading database technologies, along with Microsoft SQL Server's Database and IBM's DB2. Hence in this paper, we have tried to answer the million-dollar question “What is user’s responsibility to harden the oracle database for its security?” This paper gives practical guidelines for hardening the oracle database, so that attacker will be prevented to get access into the database. The practical lookout for protecting TNS, Accessing Remote Server and Prevention, Accessing Files on Remote Server, Fetching Environment Variables, Privileges and Authorizations, Access Control, writing security policy, Database Encryption, Oracle Data Mask, Standard built in Auditing and Fine Grained Auditing (FGA) is illustrated with SQL syntax and executed with suitable real life examples and its output is tested and verified. This structured method acts as Data Invictus wall for the attacker and protect user’s database.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here