Applied Oracle Security: Developing Secure Database and Middleware Environments- P38

Applied Oracle Security: Developing Secure Database and Middleware Environments- P38:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 344 Part II Oracle Database Vault However an operational DBA can use EXPLAIN PLAN without being authorized in the realm to determine whether query or storage optimization techniques need to be applied to resolve performance issues. -- an operational DBA cannot query -- the realm protected data and analyze with AUTOTRACE ON jean_oper_dba@aos SET AUTOTRACE ON jean_oper_dba@aos SELECT COUNT FROM WHERE state_province VA 2 3 FROM ERROR at line 2 ORA-01031 insufficient privileges jean_oper_dba@aos EXPLAIN PLAN FOR SELECT COUNT FROM WHERE state_province VA Explained. -- query the EXPLAIN PLAN data to -- retrieve the diagnostic information SELECT plan_table_output FROM TABLE PLANTABLEOUTPUT Plan hash value 296924608 Id Operation Name Rows Bytes Cost cpu Time 0 SELECT STATEMENT 1 1 11 898 1 00 00 11 1 SORT AGGREGATE 1 1 11 2 TABLE ACCESS FULL CUSTOMERS 383 4213 898 1 00 00 11 Predicate Information identified by operation id PLANTABLEOUTPUT 2 - filter nSTATE_PROVINCEn VA 14 rows selected. Advanced Monitoring and Alerting with a DBV Database In this section we present some exciting new features that are available in the latest version of the OEM GC product. These features offer centralized monitoring audit reporting and alerting for all DBV-enabled databases in your enterprise. They also enable the macro-level auditing type view Chapter 7 Applied Database Vault for Existing Applications 345 of the enterprise security posture that was first introduced in Chapter 2. We conclude the section with a simple example of how you can extend the DBV Rule Set component to integrate your existing monitoring and alerting systems with context-sensitive information regarding DBV policy violations that occur. Monitoring and Alerting on DBV with OEM GC Another useful feature added to OEM GC is the ability to monitor and alert on DBV policy changes DBV configuration issues and DBV policy

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
10    83    2    22-05-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.