Implementing Database Security and Auditing phần 1 pps

Implementing Database Security and Auditing phần 1 pps

Implementing Database Security and Auditing phần 1 pps

... Started 1 1 .1 Harden your database environment 6 1. 1 .1 Hardening an Oracle environment 7 1. 1.2 Hardening a SQL Server environment 10 1. 1.3 Hardening a DB2 UDB (LUW) environment 13 1. 1.4 Hardening ... Sybase environment 14 1. 1.5 Hardening a MySQL environment 16 1. 1.6 Use configuration scanners or audit checklists 17 1. 2 Patch your database 20 1. 2 .1 Track securi...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 360
  • 0
Implementing Database Security and Auditing phần 2 pdf

Implementing Database Security and Auditing phần 2 pdf

... of database security and/ or auditing. For example, you can start with network security and address protection of your database from remote attacks. You can start with a user-oriented approach and ... implemented selectively and in tandem with one another, creating multiple security layers within the database security layer. 2.2 The security software landscape More...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 414
  • 0
Implementing Database Security and Auditing phần 3 doc

Implementing Database Security and Auditing phần 3 doc

... NFS-or-IIS 10 30/tcp open iad1 10 39/tcp open unknown 10 40/tcp open unknown 14 33/tcp open ms-sql-s 15 21/ tcp open oracle 17 23/tcp open pptp 17 48/tcp open unknown 17 54/tcp open unknown 18 08/tcp open ... 20 01 00 00 01 00 00 01 00 0050 02 00 00 00 00 00 04 00 01 b4 00 00 00 00 b4 00 0060 01 4e 54 4c 4d 53 53 50 00 03 00 00 00 18 00 18 .NTLMSSP 0070 00 84 00 00 00 18 0...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 388
  • 0
Implementing Database Security and Auditing phần 4 pdf

Implementing Database Security and Auditing phần 4 pdf

... (UPPER('SQL*Plus') LIKE UPPER(PRODUCT)) AND (UPPER(USER) LIKE USERID) If (as SYSTEM) I issue the following command: insert into 13 6 5 .1 Reviewing where and how database users and passwords are maintained ... from “client A” and can pass this to the 5 .1 Reviewing where and how database users and passwords are maintained 13 7 Chapter 5 Once you...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 435
  • 0
Implementing Database Security and Auditing phần 5 docx

Implementing Database Security and Auditing phần 5 docx

... 5 .1 Oracle security alerts for Oracle Applications Oracle Security Alert Number Vulnerable Oracle Applications Versions 32 11 .5 .1- 11. 5.6 44 11 i 53 10 .7 -11 .5.8 56 11 .5 .1- 11. 5.8 57 11 .0.x, 11 .5 .1- 11. 5.8 Table ... SALARY=SALARY *1. 1 . In this case the security system will know the following:  The request is coming from 19 2 .16 8 .1. 168.  The request...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 483
  • 0
Implementing Database Security and Auditing phần 6 docx

Implementing Database Security and Auditing phần 6 docx

... create a database- to -database call of: SELECT "A1"."USERNAME","A1"."TERMINAL" FROM "V$PROCESS" "A1" 220 7.4 Understand Web services security ... database and have security built into both the application layer and the database. The first set of issues involves known (and unknown) Apache server vul- nerabilities. As...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 364
  • 0
Implementing Database Security and Auditing phần 7 pdf

Implementing Database Security and Auditing phần 7 pdf

... example, if an INSERT request from a database client looks like: INSERT INTO CREDIT_CARDS VALUES(&apos ;12 ',&apos ;11 111 111 111 111 11& apos;,' 011 0') then the scrubbed format will ... sp_droprolemember, and sp_changegroup. 11 1 Audit Add/Drop Role Occurs when a login is added or removed as a database user to a database; for sp_addrole and sp_droprole. 11...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 422
  • 0
Implementing Database Security and Auditing phần 8 ppt

Implementing Database Security and Auditing phần 8 ppt

... does each one mean to you? 329 Chapter 11 11 .1. 1 Health Insurance Portability and Accountability Act of 19 96 (HIPAA) HIPAA (also known as Public Law 10 4 -19 1 or the Kennedy-Kassenbaum Bill) is ... these large (and not “plain language” texts) and how they map into database environments and database security implementations. You’ll also see the relationship between s...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 251
  • 0
Implementing Database Security and Auditing phần 9 potx

Implementing Database Security and Auditing phần 9 potx

... a baseline. If you baseline your database access, you may see activities such as the following: user1 19 2 .16 8 .1. 168 SQLLoader 2am-4am user2 19 2 .16 8 .1. 168 ETL 12 am-6am If you see this type ... segregation of duties and the use of multiple audit layers is the Figure 11 .4 A compliance report based on the selected rules. 11 .3 The role of auditing 3 41 Chapter 11 11...
Ngày tải lên : 08/08/2014, 18:22
  • 44
  • 349
  • 0
Implementing Database Security and Auditing phần 10 doc

Implementing Database Security and Auditing phần 10 doc

... tools, 11 4 Password cracker tools, 11 1 12 Passwords for all database components, 12 0–22 in application configuration files, 12 9–34 auditing, 11 1 changing (SQL Server), 10 5 clear text, 13 0 cracking, 10 9 11 don’ts, ... 11 1 SQL errors, 16 4–65 DB2, 16 5 logging, 360 monitoring, 16 5, 16 6 MySQL, 16 5 Oracle, 16 4 SQL Server, 16 4 Sybase, 16 4 types of, 16 5 SQL firew...
Ngày tải lên : 08/08/2014, 18:22
  • 37
  • 377
  • 0