Enviar pesquisa
Carregar
Auditing Security of Oracle Database
•
Transferir como PPT, PDF
•
10 gostaram
•
5,716 visualizações
Título melhorado com IA
DCIT, a.s.
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 98
Baixar agora
Recomendados
Oracle Database Security
Oracle Database Security
Troy Kitch
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
Troy Kitch
Presentation database security enhancements with oracle
Presentation database security enhancements with oracle
xKinAnx
Oracle Security Presentation
Oracle Security Presentation
Francisco Alvarez
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
Geek Sync | Understanding Oracle Database Security
Geek Sync | Understanding Oracle Database Security
IDERA Software
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
Oracle Key Vault Overview
Oracle Key Vault Overview
Troy Kitch
Recomendados
Oracle Database Security
Oracle Database Security
Troy Kitch
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
Troy Kitch
Presentation database security enhancements with oracle
Presentation database security enhancements with oracle
xKinAnx
Oracle Security Presentation
Oracle Security Presentation
Francisco Alvarez
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
Geek Sync | Understanding Oracle Database Security
Geek Sync | Understanding Oracle Database Security
IDERA Software
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
Oracle Key Vault Overview
Oracle Key Vault Overview
Troy Kitch
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
Oracle BH
AV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
Oracle Database Firewall - Pierre Leon
Oracle Database Firewall - Pierre Leon
OracleVolutionSeries
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Troy Kitch
Oracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
Oracle database 12c 2 day + security guide
Oracle database 12c 2 day + security guide
bupbechanhgmail
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
OracleTrainings
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
DLT Solutions
SQL Server Security - Attack
SQL Server Security - Attack
webhostingguy
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
InSync2011
Database Options
Database Options
Connor McDonald
Oracle 11g security - 2014
Oracle 11g security - 2014
Connor McDonald
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
Database security issues
Database security issues
n|u - The Open Security Community
Database security2 adebiaye
Database security2 adebiaye
DR RICHMOND ADEBIAYE
Database Systems Security
Database Systems Security
amiable_indian
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Georgi Kodinov
Brochure Imperva Vormetric
Brochure Imperva Vormetric
Michelle Guerrero Montalvo
Protecting the Healthcare Database
Protecting the Healthcare Database
Steve Dunn
Security of the database
Security of the database
Pratik Tamgadge
Osobní bezpečnost na internetu
Osobní bezpečnost na internetu
DCIT, a.s.
Oracle db subprograms
Oracle db subprograms
Simon Huang
Mais conteúdo relacionado
Mais procurados
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
Oracle BH
AV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
Oracle Database Firewall - Pierre Leon
Oracle Database Firewall - Pierre Leon
OracleVolutionSeries
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Troy Kitch
Oracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
Oracle database 12c 2 day + security guide
Oracle database 12c 2 day + security guide
bupbechanhgmail
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
OracleTrainings
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
DLT Solutions
SQL Server Security - Attack
SQL Server Security - Attack
webhostingguy
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
InSync2011
Database Options
Database Options
Connor McDonald
Oracle 11g security - 2014
Oracle 11g security - 2014
Connor McDonald
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
Database security issues
Database security issues
n|u - The Open Security Community
Database security2 adebiaye
Database security2 adebiaye
DR RICHMOND ADEBIAYE
Database Systems Security
Database Systems Security
amiable_indian
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Georgi Kodinov
Brochure Imperva Vormetric
Brochure Imperva Vormetric
Michelle Guerrero Montalvo
Protecting the Healthcare Database
Protecting the Healthcare Database
Steve Dunn
Security of the database
Security of the database
Pratik Tamgadge
Mais procurados
(20)
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
AV/DF Advanced Security Option
AV/DF Advanced Security Option
Oracle Database Firewall - Pierre Leon
Oracle Database Firewall - Pierre Leon
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Oracle database 12c security and compliance
Oracle database 12c security and compliance
Oracle database 12c 2 day + security guide
Oracle database 12c 2 day + security guide
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
SQL Server Security - Attack
SQL Server Security - Attack
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database Options
Database Options
Oracle 11g security - 2014
Oracle 11g security - 2014
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Database security issues
Database security issues
Database security2 adebiaye
Database security2 adebiaye
Database Systems Security
Database Systems Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Brochure Imperva Vormetric
Brochure Imperva Vormetric
Protecting the Healthcare Database
Protecting the Healthcare Database
Security of the database
Security of the database
Destaque
Osobní bezpečnost na internetu
Osobní bezpečnost na internetu
DCIT, a.s.
Oracle db subprograms
Oracle db subprograms
Simon Huang
Secure Technical Implementation Guide for databases by Martin Obst
Secure Technical Implementation Guide for databases by Martin Obst
Carsten Muetzlitz
Oracle security 08-oracle network security
Oracle security 08-oracle network security
Zhaoyang Wang
1 z0 052
1 z0 052
Wasim Ahmed
Oracle Berkeley Db 11g R2
Oracle Berkeley Db 11g R2
Prem Kumar
Oracle security 02-administering user security
Oracle security 02-administering user security
Zhaoyang Wang
Oracle Compute Cloud Service快速实践
Oracle Compute Cloud Service快速实践
Zhaoyang Wang
Destaque
(8)
Osobní bezpečnost na internetu
Osobní bezpečnost na internetu
Oracle db subprograms
Oracle db subprograms
Secure Technical Implementation Guide for databases by Martin Obst
Secure Technical Implementation Guide for databases by Martin Obst
Oracle security 08-oracle network security
Oracle security 08-oracle network security
1 z0 052
1 z0 052
Oracle Berkeley Db 11g R2
Oracle Berkeley Db 11g R2
Oracle security 02-administering user security
Oracle security 02-administering user security
Oracle Compute Cloud Service快速实践
Oracle Compute Cloud Service快速实践
Semelhante a Auditing Security of Oracle Database
Les 01 core
Les 01 core
Femi Adeyemi
les_01_core.ppt
les_01_core.ppt
SoloParaTi7
Installing oracle grid infrastructure and database 12c r1
Installing oracle grid infrastructure and database 12c r1
Voeurng Sovann
Asian Spirit 3 Day Dba On Ubl
Asian Spirit 3 Day Dba On Ubl
newrforce
Oracle forensics 101
Oracle forensics 101
fangjiafu
Linux configer
Linux configer
MD. AL AMIN
Dr3150012012202 1.getting started
Dr3150012012202 1.getting started
Namgu Jeong
Oracle applications 11i hot backup cloning with rapid clone
Oracle applications 11i hot backup cloning with rapid clone
Deepti Singh
24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs
Kellyn Pot'Vin-Gorman
Oracle applications 11i hot backup cloning with rapid clone
Oracle applications 11i hot backup cloning with rapid clone
Deepti Singh
Exachk and oem12c - IOUG C15LV
Exachk and oem12c - IOUG C15LV
Bobby Curtis
How to create a non managed standby database
How to create a non managed standby database
Jorge Batista
Oracle Enterprise Manager 12c - OEM12c Presentation
Oracle Enterprise Manager 12c - OEM12c Presentation
Francisco Alvarez
Presentation deploying oracle database 11g securely on oracle solaris
Presentation deploying oracle database 11g securely on oracle solaris
xKinAnx
EM12C High Availability without SLB and RAC
EM12C High Availability without SLB and RAC
Secure-24
DevOps for database
DevOps for database
Osama Mustafa
Docker London: Container Security
Docker London: Container Security
Phil Estes
Oracle Solaris 11.1 New Features
Oracle Solaris 11.1 New Features
Orgad Kimchi
PHP Oracle
PHP Oracle
Nur Hidayat
Linux
Linux
Patruni Chidananda Sastry
Semelhante a Auditing Security of Oracle Database
(20)
Les 01 core
Les 01 core
les_01_core.ppt
les_01_core.ppt
Installing oracle grid infrastructure and database 12c r1
Installing oracle grid infrastructure and database 12c r1
Asian Spirit 3 Day Dba On Ubl
Asian Spirit 3 Day Dba On Ubl
Oracle forensics 101
Oracle forensics 101
Linux configer
Linux configer
Dr3150012012202 1.getting started
Dr3150012012202 1.getting started
Oracle applications 11i hot backup cloning with rapid clone
Oracle applications 11i hot backup cloning with rapid clone
24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs
Oracle applications 11i hot backup cloning with rapid clone
Oracle applications 11i hot backup cloning with rapid clone
Exachk and oem12c - IOUG C15LV
Exachk and oem12c - IOUG C15LV
How to create a non managed standby database
How to create a non managed standby database
Oracle Enterprise Manager 12c - OEM12c Presentation
Oracle Enterprise Manager 12c - OEM12c Presentation
Presentation deploying oracle database 11g securely on oracle solaris
Presentation deploying oracle database 11g securely on oracle solaris
EM12C High Availability without SLB and RAC
EM12C High Availability without SLB and RAC
DevOps for database
DevOps for database
Docker London: Container Security
Docker London: Container Security
Oracle Solaris 11.1 New Features
Oracle Solaris 11.1 New Features
PHP Oracle
PHP Oracle
Linux
Linux
Mais de DCIT, a.s.
Smerovanie IT bezpečnosti na Slovensku (Martin Zajíček)
Smerovanie IT bezpečnosti na Slovensku (Martin Zajíček)
DCIT, a.s.
Bezpečnosť mobilných aplikácií (Martin Zajíček)
Bezpečnosť mobilných aplikácií (Martin Zajíček)
DCIT, a.s.
Implementace bezpecnostni politiky v organizaci
Implementace bezpecnostni politiky v organizaci
DCIT, a.s.
Útok na užívateľa zabezpečenej WWW aplikácie (Martin Zajíček)
Útok na užívateľa zabezpečenej WWW aplikácie (Martin Zajíček)
DCIT, a.s.
Internetové bankovníctvo - útok na užívateľa (Martin Zajíček)
Internetové bankovníctvo - útok na užívateľa (Martin Zajíček)
DCIT, a.s.
Ľudský faktor – najslabší článok bezpečnosti (Martin Zajíček)
Ľudský faktor – najslabší článok bezpečnosti (Martin Zajíček)
DCIT, a.s.
Bezpečnostný audit a penetračné testy (Martin Zajíček)
Bezpečnostný audit a penetračné testy (Martin Zajíček)
DCIT, a.s.
Bezpečnosť webových aplikácií (Martin Zajíček)
Bezpečnosť webových aplikácií (Martin Zajíček)
DCIT, a.s.
Jen technická obrana nestačí (Jindřich Hlaváč)
Jen technická obrana nestačí (Jindřich Hlaváč)
DCIT, a.s.
Interpretace výsledků penetračních testů (Karel Miko)
Interpretace výsledků penetračních testů (Karel Miko)
DCIT, a.s.
Konfigurační standardy (Luboš Číž)
Konfigurační standardy (Luboš Číž)
DCIT, a.s.
Bezpečnost otevřených a uzavřených řešení (Martin Mačok)
Bezpečnost otevřených a uzavřených řešení (Martin Mačok)
DCIT, a.s.
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
DCIT, a.s.
Mais de DCIT, a.s.
(13)
Smerovanie IT bezpečnosti na Slovensku (Martin Zajíček)
Smerovanie IT bezpečnosti na Slovensku (Martin Zajíček)
Bezpečnosť mobilných aplikácií (Martin Zajíček)
Bezpečnosť mobilných aplikácií (Martin Zajíček)
Implementace bezpecnostni politiky v organizaci
Implementace bezpecnostni politiky v organizaci
Útok na užívateľa zabezpečenej WWW aplikácie (Martin Zajíček)
Útok na užívateľa zabezpečenej WWW aplikácie (Martin Zajíček)
Internetové bankovníctvo - útok na užívateľa (Martin Zajíček)
Internetové bankovníctvo - útok na užívateľa (Martin Zajíček)
Ľudský faktor – najslabší článok bezpečnosti (Martin Zajíček)
Ľudský faktor – najslabší článok bezpečnosti (Martin Zajíček)
Bezpečnostný audit a penetračné testy (Martin Zajíček)
Bezpečnostný audit a penetračné testy (Martin Zajíček)
Bezpečnosť webových aplikácií (Martin Zajíček)
Bezpečnosť webových aplikácií (Martin Zajíček)
Jen technická obrana nestačí (Jindřich Hlaváč)
Jen technická obrana nestačí (Jindřich Hlaváč)
Interpretace výsledků penetračních testů (Karel Miko)
Interpretace výsledků penetračních testů (Karel Miko)
Konfigurační standardy (Luboš Číž)
Konfigurační standardy (Luboš Číž)
Bezpečnost otevřených a uzavřených řešení (Martin Mačok)
Bezpečnost otevřených a uzavřených řešení (Martin Mačok)
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
Último
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
XfilesPro
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Último
(20)
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Auditing Security of Oracle Database
1.
#342 – Auditing
Security of Oracle Database Karel Miko, CISA Consultancy Division, Director DCIT a.s. (Czech Republic)
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
[D] Info about
installed patches using opatch utility [oracle@orabox ~]$ $ORACLE_HOME/OPatch/opatch lsinventory Invoking OPatch 10.2.0.3.3 Oracle interim Patch Installer version 10.2.0.3.3 Copyright (c) 2007, Oracle Corporation. All rights reserved.. Oracle Home : /oracle/orahome Central Inventory : /oracle/orabase/oraInventory from : /etc/oraInst.loc OPatch version : 10.2.0.3.3 OUI version : 10.2.0.3.0 OUI location : /oracle/orahome/oui Log file location : /oracle/orahome/cfgtoollogs/opatch/opatch2008-01-19_20-32-27PM.log Lsinventory Output file location : /oracle/orahome/cfgtoollogs/opatch/lsinv/lsinventory2008-01-19_20-32-27PM.txt -------------------------------------------------------------------------------- Installed Top-level Products (2): Oracle Database 10g 10.2.0.1.0 Oracle Database 10g Release 2 Patch Set 2 10.2.0.3.0 There are 2 products installed in this Oracle Home. Interim patches (32) : Patch 6394981 : applied on Tue Nov 20 10:16:48 CET 2007 Created on 16 Sep 2007, 11:56:18 hrs PST8PDT Bugs fixed: 6394981 ... -------------------------------------------------------------------------------- OPatch succeeded. patch 6394981 Installed patchsets
32.
[D] Metalink
– patch search 6394981
33.
[D] Metalink
– CPU availability info 6394981
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
Thank you!
Baixar agora