Soumettre la recherche
Mettre en ligne
Auditing Security of Oracle Database
•
Télécharger en tant que PPT, PDF
•
10 j'aime
•
5,716 vues
Titre amélioré par l'IA
DCIT, a.s.
Suivre
Technologie
Signaler
Partager
Signaler
Partager
1 sur 98
Télécharger maintenant
Recommandé
Oracle Database Security
Oracle Database Security
Troy Kitch
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
Troy Kitch
Presentation database security enhancements with oracle
Presentation database security enhancements with oracle
xKinAnx
Oracle Security Presentation
Oracle Security Presentation
Francisco Alvarez
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
Geek Sync | Understanding Oracle Database Security
Geek Sync | Understanding Oracle Database Security
IDERA Software
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
Oracle Key Vault Overview
Oracle Key Vault Overview
Troy Kitch
Recommandé
Oracle Database Security
Oracle Database Security
Troy Kitch
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
Troy Kitch
Presentation database security enhancements with oracle
Presentation database security enhancements with oracle
xKinAnx
Oracle Security Presentation
Oracle Security Presentation
Francisco Alvarez
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Edgar Alejandro Villegas
Geek Sync | Understanding Oracle Database Security
Geek Sync | Understanding Oracle Database Security
IDERA Software
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
Oracle Key Vault Overview
Oracle Key Vault Overview
Troy Kitch
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
Oracle BH
AV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
Oracle Database Firewall - Pierre Leon
Oracle Database Firewall - Pierre Leon
OracleVolutionSeries
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Troy Kitch
Oracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
Oracle database 12c 2 day + security guide
Oracle database 12c 2 day + security guide
bupbechanhgmail
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
OracleTrainings
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
DLT Solutions
SQL Server Security - Attack
SQL Server Security - Attack
webhostingguy
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
InSync2011
Database Options
Database Options
Connor McDonald
Oracle 11g security - 2014
Oracle 11g security - 2014
Connor McDonald
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
Database security issues
Database security issues
n|u - The Open Security Community
Database security2 adebiaye
Database security2 adebiaye
DR RICHMOND ADEBIAYE
Database Systems Security
Database Systems Security
amiable_indian
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Georgi Kodinov
Brochure Imperva Vormetric
Brochure Imperva Vormetric
Michelle Guerrero Montalvo
Protecting the Healthcare Database
Protecting the Healthcare Database
Steve Dunn
Security of the database
Security of the database
Pratik Tamgadge
Osobní bezpečnost na internetu
Osobní bezpečnost na internetu
DCIT, a.s.
Oracle db subprograms
Oracle db subprograms
Simon Huang
Contenu connexe
Tendances
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
Oracle BH
AV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
Oracle Database Firewall - Pierre Leon
Oracle Database Firewall - Pierre Leon
OracleVolutionSeries
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Troy Kitch
Oracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
Oracle database 12c 2 day + security guide
Oracle database 12c 2 day + security guide
bupbechanhgmail
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
OracleTrainings
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
DLT Solutions
SQL Server Security - Attack
SQL Server Security - Attack
webhostingguy
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
InSync2011
Database Options
Database Options
Connor McDonald
Oracle 11g security - 2014
Oracle 11g security - 2014
Connor McDonald
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
Database security issues
Database security issues
n|u - The Open Security Community
Database security2 adebiaye
Database security2 adebiaye
DR RICHMOND ADEBIAYE
Database Systems Security
Database Systems Security
amiable_indian
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Georgi Kodinov
Brochure Imperva Vormetric
Brochure Imperva Vormetric
Michelle Guerrero Montalvo
Protecting the Healthcare Database
Protecting the Healthcare Database
Steve Dunn
Security of the database
Security of the database
Pratik Tamgadge
Tendances
(20)
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
AV/DF Advanced Security Option
AV/DF Advanced Security Option
Oracle Database Firewall - Pierre Leon
Oracle Database Firewall - Pierre Leon
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Oracle database 12c security and compliance
Oracle database 12c security and compliance
Oracle database 12c 2 day + security guide
Oracle database 12c 2 day + security guide
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
SQL Server Security - Attack
SQL Server Security - Attack
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database Options
Database Options
Oracle 11g security - 2014
Oracle 11g security - 2014
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Database security issues
Database security issues
Database security2 adebiaye
Database security2 adebiaye
Database Systems Security
Database Systems Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Brochure Imperva Vormetric
Brochure Imperva Vormetric
Protecting the Healthcare Database
Protecting the Healthcare Database
Security of the database
Security of the database
En vedette
Osobní bezpečnost na internetu
Osobní bezpečnost na internetu
DCIT, a.s.
Oracle db subprograms
Oracle db subprograms
Simon Huang
Secure Technical Implementation Guide for databases by Martin Obst
Secure Technical Implementation Guide for databases by Martin Obst
Carsten Muetzlitz
Oracle security 08-oracle network security
Oracle security 08-oracle network security
Zhaoyang Wang
1 z0 052
1 z0 052
Wasim Ahmed
Oracle Berkeley Db 11g R2
Oracle Berkeley Db 11g R2
Prem Kumar
Oracle security 02-administering user security
Oracle security 02-administering user security
Zhaoyang Wang
Oracle Compute Cloud Service快速实践
Oracle Compute Cloud Service快速实践
Zhaoyang Wang
En vedette
(8)
Osobní bezpečnost na internetu
Osobní bezpečnost na internetu
Oracle db subprograms
Oracle db subprograms
Secure Technical Implementation Guide for databases by Martin Obst
Secure Technical Implementation Guide for databases by Martin Obst
Oracle security 08-oracle network security
Oracle security 08-oracle network security
1 z0 052
1 z0 052
Oracle Berkeley Db 11g R2
Oracle Berkeley Db 11g R2
Oracle security 02-administering user security
Oracle security 02-administering user security
Oracle Compute Cloud Service快速实践
Oracle Compute Cloud Service快速实践
Similaire à Auditing Security of Oracle Database
Les 01 core
Les 01 core
Femi Adeyemi
les_01_core.ppt
les_01_core.ppt
SoloParaTi7
Installing oracle grid infrastructure and database 12c r1
Installing oracle grid infrastructure and database 12c r1
Voeurng Sovann
Asian Spirit 3 Day Dba On Ubl
Asian Spirit 3 Day Dba On Ubl
newrforce
Oracle forensics 101
Oracle forensics 101
fangjiafu
Linux configer
Linux configer
MD. AL AMIN
Dr3150012012202 1.getting started
Dr3150012012202 1.getting started
Namgu Jeong
Oracle applications 11i hot backup cloning with rapid clone
Oracle applications 11i hot backup cloning with rapid clone
Deepti Singh
24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs
Kellyn Pot'Vin-Gorman
Oracle applications 11i hot backup cloning with rapid clone
Oracle applications 11i hot backup cloning with rapid clone
Deepti Singh
Exachk and oem12c - IOUG C15LV
Exachk and oem12c - IOUG C15LV
Bobby Curtis
How to create a non managed standby database
How to create a non managed standby database
Jorge Batista
Oracle Enterprise Manager 12c - OEM12c Presentation
Oracle Enterprise Manager 12c - OEM12c Presentation
Francisco Alvarez
Presentation deploying oracle database 11g securely on oracle solaris
Presentation deploying oracle database 11g securely on oracle solaris
xKinAnx
EM12C High Availability without SLB and RAC
EM12C High Availability without SLB and RAC
Secure-24
DevOps for database
DevOps for database
Osama Mustafa
Docker London: Container Security
Docker London: Container Security
Phil Estes
Oracle Solaris 11.1 New Features
Oracle Solaris 11.1 New Features
Orgad Kimchi
PHP Oracle
PHP Oracle
Nur Hidayat
Linux
Linux
Patruni Chidananda Sastry
Similaire à Auditing Security of Oracle Database
(20)
Les 01 core
Les 01 core
les_01_core.ppt
les_01_core.ppt
Installing oracle grid infrastructure and database 12c r1
Installing oracle grid infrastructure and database 12c r1
Asian Spirit 3 Day Dba On Ubl
Asian Spirit 3 Day Dba On Ubl
Oracle forensics 101
Oracle forensics 101
Linux configer
Linux configer
Dr3150012012202 1.getting started
Dr3150012012202 1.getting started
Oracle applications 11i hot backup cloning with rapid clone
Oracle applications 11i hot backup cloning with rapid clone
24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs
Oracle applications 11i hot backup cloning with rapid clone
Oracle applications 11i hot backup cloning with rapid clone
Exachk and oem12c - IOUG C15LV
Exachk and oem12c - IOUG C15LV
How to create a non managed standby database
How to create a non managed standby database
Oracle Enterprise Manager 12c - OEM12c Presentation
Oracle Enterprise Manager 12c - OEM12c Presentation
Presentation deploying oracle database 11g securely on oracle solaris
Presentation deploying oracle database 11g securely on oracle solaris
EM12C High Availability without SLB and RAC
EM12C High Availability without SLB and RAC
DevOps for database
DevOps for database
Docker London: Container Security
Docker London: Container Security
Oracle Solaris 11.1 New Features
Oracle Solaris 11.1 New Features
PHP Oracle
PHP Oracle
Linux
Linux
Plus de DCIT, a.s.
Smerovanie IT bezpečnosti na Slovensku (Martin Zajíček)
Smerovanie IT bezpečnosti na Slovensku (Martin Zajíček)
DCIT, a.s.
Bezpečnosť mobilných aplikácií (Martin Zajíček)
Bezpečnosť mobilných aplikácií (Martin Zajíček)
DCIT, a.s.
Implementace bezpecnostni politiky v organizaci
Implementace bezpecnostni politiky v organizaci
DCIT, a.s.
Útok na užívateľa zabezpečenej WWW aplikácie (Martin Zajíček)
Útok na užívateľa zabezpečenej WWW aplikácie (Martin Zajíček)
DCIT, a.s.
Internetové bankovníctvo - útok na užívateľa (Martin Zajíček)
Internetové bankovníctvo - útok na užívateľa (Martin Zajíček)
DCIT, a.s.
Ľudský faktor – najslabší článok bezpečnosti (Martin Zajíček)
Ľudský faktor – najslabší článok bezpečnosti (Martin Zajíček)
DCIT, a.s.
Bezpečnostný audit a penetračné testy (Martin Zajíček)
Bezpečnostný audit a penetračné testy (Martin Zajíček)
DCIT, a.s.
Bezpečnosť webových aplikácií (Martin Zajíček)
Bezpečnosť webových aplikácií (Martin Zajíček)
DCIT, a.s.
Jen technická obrana nestačí (Jindřich Hlaváč)
Jen technická obrana nestačí (Jindřich Hlaváč)
DCIT, a.s.
Interpretace výsledků penetračních testů (Karel Miko)
Interpretace výsledků penetračních testů (Karel Miko)
DCIT, a.s.
Konfigurační standardy (Luboš Číž)
Konfigurační standardy (Luboš Číž)
DCIT, a.s.
Bezpečnost otevřených a uzavřených řešení (Martin Mačok)
Bezpečnost otevřených a uzavřených řešení (Martin Mačok)
DCIT, a.s.
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
DCIT, a.s.
Plus de DCIT, a.s.
(13)
Smerovanie IT bezpečnosti na Slovensku (Martin Zajíček)
Smerovanie IT bezpečnosti na Slovensku (Martin Zajíček)
Bezpečnosť mobilných aplikácií (Martin Zajíček)
Bezpečnosť mobilných aplikácií (Martin Zajíček)
Implementace bezpecnostni politiky v organizaci
Implementace bezpecnostni politiky v organizaci
Útok na užívateľa zabezpečenej WWW aplikácie (Martin Zajíček)
Útok na užívateľa zabezpečenej WWW aplikácie (Martin Zajíček)
Internetové bankovníctvo - útok na užívateľa (Martin Zajíček)
Internetové bankovníctvo - útok na užívateľa (Martin Zajíček)
Ľudský faktor – najslabší článok bezpečnosti (Martin Zajíček)
Ľudský faktor – najslabší článok bezpečnosti (Martin Zajíček)
Bezpečnostný audit a penetračné testy (Martin Zajíček)
Bezpečnostný audit a penetračné testy (Martin Zajíček)
Bezpečnosť webových aplikácií (Martin Zajíček)
Bezpečnosť webových aplikácií (Martin Zajíček)
Jen technická obrana nestačí (Jindřich Hlaváč)
Jen technická obrana nestačí (Jindřich Hlaváč)
Interpretace výsledků penetračních testů (Karel Miko)
Interpretace výsledků penetračních testů (Karel Miko)
Konfigurační standardy (Luboš Číž)
Konfigurační standardy (Luboš Číž)
Bezpečnost otevřených a uzavřených řešení (Martin Mačok)
Bezpečnost otevřených a uzavřených řešení (Martin Mačok)
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
Dernier
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Dernier
(20)
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Auditing Security of Oracle Database
1.
#342 – Auditing
Security of Oracle Database Karel Miko, CISA Consultancy Division, Director DCIT a.s. (Czech Republic)
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
[D] Info about
installed patches using opatch utility [oracle@orabox ~]$ $ORACLE_HOME/OPatch/opatch lsinventory Invoking OPatch 10.2.0.3.3 Oracle interim Patch Installer version 10.2.0.3.3 Copyright (c) 2007, Oracle Corporation. All rights reserved.. Oracle Home : /oracle/orahome Central Inventory : /oracle/orabase/oraInventory from : /etc/oraInst.loc OPatch version : 10.2.0.3.3 OUI version : 10.2.0.3.0 OUI location : /oracle/orahome/oui Log file location : /oracle/orahome/cfgtoollogs/opatch/opatch2008-01-19_20-32-27PM.log Lsinventory Output file location : /oracle/orahome/cfgtoollogs/opatch/lsinv/lsinventory2008-01-19_20-32-27PM.txt -------------------------------------------------------------------------------- Installed Top-level Products (2): Oracle Database 10g 10.2.0.1.0 Oracle Database 10g Release 2 Patch Set 2 10.2.0.3.0 There are 2 products installed in this Oracle Home. Interim patches (32) : Patch 6394981 : applied on Tue Nov 20 10:16:48 CET 2007 Created on 16 Sep 2007, 11:56:18 hrs PST8PDT Bugs fixed: 6394981 ... -------------------------------------------------------------------------------- OPatch succeeded. patch 6394981 Installed patchsets
32.
[D] Metalink
– patch search 6394981
33.
[D] Metalink
– CPU availability info 6394981
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
Thank you!
Télécharger maintenant