Oracle数据库安全架构课案.pptx
文本预览下载声明
;3;Your Database – An Irresistible Target;;Attack #1: Exploit the Application;;Oracle Database Firewall;Attack #2: Bypass the Application / Exploit the Database;;Attack #3: Bypass the Database;;Key Management with Oracle Key Vault;Attack #4: Abuse Privileged Accounts;Oracle Database Vault Privilege Analysis;Attack #5: Access Exported Data;010010110010101001001001001001001001001001001000100101010010;Final Defense: Monitor Activity;Database Auditing;;;Oracle Database Maximum Security Architecture;Monday, Oct 26
What’s New in Oracle Database Security [CON6819]
Oracle Audit Vault and Database Firewall—Detect Breaches and Prevent Attacks [CON8668]
Data Protection in an Oracle E-Business Suite Situation? Oracle Label Security Is the Answer [CON2075]
Tuesday, Oct 27
Oracle Database Maximum Security Architecture—Protecting Critical Data Assets [CON8803]
Mask and Subset Sensitive Data for Test/Dev Databases On Premises or in the Cloud [CON8625]
Database Security: Preventing and Detecting Privileged User Attacks [HOL10437];24
显示全部