SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
© 2011 Oracle Corporation
<Insert Picture Here>




Protect Your Most Sensitive Data
Build a Maximum Security Architecture
Ryan Kim | Senior Manager, Technology Readiness and Developer Program

                                                                        2
The following is intended to outline our general
                  product direction. It is intended for information
                  purposes only, and may not be incorporated into any
                  contract. It is not a commitment to deliver any
                  material, code, or functionality, and should not be
                  relied upon in making purchasing decisions.
                  The development, release, and timing of any
                  features or functionality described for Oracle‘s
                  products remains at the sole discretion of Oracle.




© 2011 Oracle Corporation                                               3
Agenda



        •   Data Security Trends
        •   How Are Threats Getting In?
        •   What is Maximum Security Architecture
        •   Oracle Solutions Mapped to MSA
        •   Summary
        •   Q&A




© 2011 Oracle Corporation                           4
More data than ever…




                                                  Growth Doubles
                                                      Yearly




                                                  1,800 Exabytes

              2006                                     2011



Source: IDC, 2008
© 2011 Oracle Corporation   Oracle Confidential                    5
More breaches than ever…

           Data Breach               Once exposed, the data is out there – the bell can’t be un-rung
                                                       PUBLICLY REPORTED DATA BREACHES
                                    400


                                    300
                                                       630%
                                                       Increase
                                    200


                                    100
               Total Personally
        Identifying Information
             Records Exposed           0
                       (Millions)               2005                    2006     2007        2008


                                          Average cost of a data breach $202 per record
                                        Average total cost exceeds $6.6 million per breach



Source: DataLossDB, Ponemon Institute, 2009
 © 2011 Oracle Corporation                                Oracle Confidential                          6
More threats than ever…




 70% attacks originate inside the perimeter
 90% attacks perpetrated by employees with privileged access



© 2011 Oracle Corporation                   Oracle Confidential   7
More regulations than ever…




                                                                • Federal, state, local, industry…adding more
                                                                  mandates every year!
                                                                • Need to meet AND demonstrate compliance
                                                                • Compliance costs are unsustainable


     ?
            Report and audit

                                    90%     Companies behind in compliance




Source: IT Policy Compliance Group, 2007.
 © 2011 Oracle Corporation                                                                                      8
Compliance
 • 현행 개인정보 보호 법률 체계
              구분                개별 법률          적용대상        소관부처
          공공 부문             공공기관의 개인정보보호법      공공기관        행정안전부
   민간            정보통신          정보통신망법       정보통신서비스제공자    방송통신위원회
   부문            금융/신용         신용정보법        신용정보 제공/이용자    금융위원회

 • 개인정보 보호법 ( 2011년 9월 시행)
       • 온라인/오프라인 상관없이 모든 업종에 걸쳐 적용.                   공공기관의
       • 정보통신망법과 신용정보법은 그대로 유지.             공공        개인정보보호법      개
       • 정보통신망법과 신용정보법이 통신사업자와                                     인
         금융기관에 먼저 적용되고 동 법률들에서 규정하지
         않는 조항에 대해 개인정보 보호법이 적용됨            통신                     정
                                                      정보통신망법       보
       • 정보통신망법의 적용을 받던 통신 사업자이외의
         준용사업자는 모두 망법 에서 삭제되고 개인정보                                 보
         보호법의 직접 적용을 받음                     금융
                                                                   호

                                                       신용정보법       법
                                            기타




© 2011 Oracle Corporation                                              9
Higher Costs Than Ever…




             • User Management Costs
             • User Productivity Costs
             • Compliance & Remediation Costs
             • Security Breach Remediation Costs

                                                   $
                                                       It Adds Up



© 2011 Oracle Corporation                                           10
Biggest Barrier to Cloud Computing
            Adoption? Security!



                            74%
                                      74% rate cloud
                                      security issues
                                          as ―very
                                        significant‖
                                        Source: IDC




© 2011 Oracle Corporation                               11
•   Data Security Trends
        •   How Are Threats Getting In?
        •   What is Maximum Security Architecture
        •   Oracle Solutions Mapped to MSA
        •   Summary
        •   Q&A




© 2011 Oracle Corporation                           12
Over 900M Breached Records Resulted
           from Compromised Database Servers
  Type                          Category                 % Breaches % Records
  Database Server               Servers & Applications      25%       92%
  Desktop Computer              End-User Devices            21%        1%




   Verizon 2010 Data Breach Investigations Report

© 2011 Oracle Corporation                                                       13
SQL Injection Attacks Against Databases
            Responsible for 89% of Breached Data
            • SQL injection is a technique for controlling responses from the database
              server through the web application
            • It can‘t be fixed by simply applying a patch, tweaking a setting, or
              changing a single page
            • SQL injection vulnerabilities are endemic, and to fix them you have to
              overhaul all your code.




                 ―The versatility and effectiveness of SQL Injection
                 make it a multi-tool of choice among cybercriminals.‖
   Verizon 2010 Data Breach Investigations Report

© 2011 Oracle Corporation                                                                14
66% Organizations Vulnerable to SQL
            Injection Attacks
               Taken steps to prevent SQL injection attacks?




   2010 IOUG Data Security Survey Report

© 2011 Oracle Corporation                                      15
Traditional Security Solutions Leave
            Data within Databases Vulnerable
                  Key Loggers           Malware       SQL Injection       Espionage
                       Spear Phishing       Botware         Social Engineering




                        Database
                       Applications                                           Database Users
                                                                             and Administrators




        Maximum Security Architecture
 Protects Your Most Sensitive Area: Your Data
© 2011 Oracle Corporation                                                                         16
•   Data Security Trends
        •   How Are Threats Getting In?
        •   What is Maximum Security Architecture
        •   Oracle Solutions Mapped to MSA
        •   Summary
        •   Q&A




© 2011 Oracle Corporation                           17
Maximum Security Architecture
           Safeguards your Information Technology environment
           at every layer, leaving no weak link Infrastructure Security
                                                                                     •   Network Security
                                                                                     •   Hardware Security
                                                                                     •   OS / Firmware Security
                                                                                     •   Virtualization Security

                                                                                     Database Security

                                                                                         Identity Management
                                                                                     •   User Provisioning
                                                                                     •   Role Management
       Information
                                                                                     •   Entitlements Management
                       Infrastructure                                                •   Risk-Based Access Control
                                                                                     •   Virtual Directories
                                        Databases

                                                    Applications                     Information Rights
                                                                       Content
                                                                                     Management
                                                                                     •   Track and Audit Document Usage
      Today we will focus on Maximum DATA                                            •   Control & Revoke Document Access
                                                                                     •   Secured Inside or Outside Firewall
     Security Architecture for the Database tier                                     •   Centralized Policy Administration


© 2011 Oracle Corporation                                      Oracle Confidential                                       18
Maximum Data Security Architecture
                                             1. Perimeter Defense
      2. Monitoring                                         Detect &
                                                          Audit Mis-use   Reverse
                               Secure
                                                                          & Undo
                             Configuration
                                                                          Damage

       3. Access Control

                            Privileged                                     Multi-factor
                               User                                       Authorization
                            Controls

       4. Encryption & Masking

                                                                           Mask Data
                             Encrypt                                      Used in Dev.
                             Data In-                    Protect Data
                                                                           & Testing
                             Transit                      Backups


© 2011 Oracle Corporation                                                            19
Oracle Configuration Management
            Vulnerability Assessment & Secure Configuration




                                Discover   Classify      Assess      Prioritize   Fix         Monitor

                              Asset                                        Configuration
                                            Policy         Vulnerability                   Analysis &
                              Management                                   Management
                                            Management     Management                      Analytics
                                                                           & Audit




             REQUIREMENTS:
             1. Discovers Databases, OS, Hosts, remote end-points, apps & apps servers
             2. Continuous scanning vs. 375+ best practices & industry standards, extensible
             3. Detect, prevent and roll-back unauthorized configuration changes real time
             4. Change management compliance reports
             5. Platform & vendor agnostic

© 2011 Oracle Corporation                                                                               20
Detection & Auditing Against Mis-use
            Automated Activity Monitoring & Audit Reporting


                             HR Data                        !   Alerts


                                                                Built-in
                            CRM Data                            Reports
                                        Audit
                                         Data                   Custom
                            ERP Data                            Reports


                                                                Policies
                            Databases                                      Auditor



             REQUIREMENTS:
             1. Automated Oracle and non-Oracle database activity monitoring
             2. Detect and alert on suspicious activities
             3. Out-of-the box compliance reports
             4. Custom forensic reports
             5. Centralized management of audit policies (SOX, custom, etc.)

© 2011 Oracle Corporation                                                            21
Reverse and Undo Damaged Data
           Secure Change Tracking


                                       select salary from emp AS OF TIMESTAMP
                                       '02-MAY-09 12.00 AM‗ where emp.title = ‗admin‘




           REQUIREMENTS:
           1. Transparently track data changes
           2. Efficient, tamper-resistant storage of archives
           3. Real-time access to historical data
           4. Simplified forensics and error correction
           5. Ability to roll-back and undo damaged records, eliminating problems

© 2011 Oracle Corporation                                                               22
Separation of Duties
            Privileged User Access Control and Multifactor Authorization




                                             Procurement
                                                                            DBA
                                                  HR
              Application
                                               Finance
                                                             select * from finance.customers

       REQUIREMENTS:
       1. Keep privileged database users from abusing their powers
       2. Address Separation of Duties requirements
       3. Enforce security policies and block unauthorized database activities
       4. Prevent application by-pass to protect application data
       5. Securely consolidate application data
       6. Requires no application changes

© 2011 Oracle Corporation                                                                      23
Prevent Unauthorized Insider Access
            Data Classification for Access Control



                                              Sensitive
                                                Transactions

                                              Confidential
                                                Report Data
                                              Public
                                                  Reports

                   Confidential                                               Sensitive



                  REQUIREMENTS:
                  1. Classify users and data based on business drivers
                  2. Database enforced row level access control
                  3. Users classification through Oracle Identity Management Suite
                  4. Classification labels can be factors in other policies
                  5. Certified with Oracle Database and is application agnostic

© 2011 Oracle Corporation                                                                 24
Encrypt Sensitive or In-transit Data
            Comprehensive Standards-Based Encryption

                                                           Disk


                                                           Backups


                                                           Exports

                                                           Off-Site
                                                           Facilities




           REQUIREMENTS:
           1. Transparent data at rest encryption
           2. Data stays encrypted when backed up
           3. Encryption for data in transit
           4. Strong authentication of users and servers
           5. Certified with Oracle Database

© 2011 Oracle Corporation                                               25
Securely Backup & Store Data Archives
          Integrated Tape or Cloud Backup Management




                  REQUIREMENTS:
                  1. Secure data archival to tape or cloud
                  2. Easy to administer key management
                  3. Fastest Oracle Database tape backups
                  4. Leverage low-cost cloud storage

© 2011 Oracle Corporation                                    26
Mask data used in development & test
          Irreversible De-Identification


                       Production                                     Non-Production
    LAST_NAME               SSN           SALARY               LAST_NAME    SSN           SALARY

    AGUILAR                 203-33-3234   40,000               ANSKEKSL     111—23-1111     60,000

    BENSON                  323-22-2943   60,000               BKJHHEIEDK   222-34-1345     40,000




              REQUIREMENTS:
              1. Remove sensitive data from non-production databases
              2. Referential integrity preserved so applications continue to work
              3. Sensitive data never leaves the database
              4. Extensible template library and policies for automation
              5. Supports heterogeneous Database envrionments

© 2011 Oracle Corporation                                                                          27
Application of MSA to Safeguard your Data
         Recap of how to secure your business’ most valuable asset
                                                     Encryption and Masking
                                                    Encrypt Sensitive & In-transit Data
                                                    Protect Data Back-ups
                                                    Mask Data for Dev. & Testing Use
                                                     Access Control
                                                    Control Privileged Users
                                                    Multi-factor Authorization
                                                     Auditing and Monitoring
                                                    Secure Configurations
                            Encryption & Masking    Detect and Audit Mis-use
                                                    Reverse and undo Damage
                               Access Control
                            Auditing & Monitoring    Blocking and Logging
                            Blocking & Logging
                                                    Perimeter Defense


© 2011 Oracle Corporation                                                                 28
•   Data Security Trends
        •   How Are Threats Getting In?
        •   What is Maximum Security Architecture
        •   Oracle Solutions Mapped to MSA
        •   Summary
        •   Q&A




© 2011 Oracle Corporation                           29
Oracle Solutions Mapped to MSA
         Integrated products to deliver MSA capabilities for your Databases

            Encryption and Masking               Encryption and Masking
          Encrypt Sensitive & In-transit Data   Advanced Security Option
          Protect Data Back-ups                 Secure Back-up
          Mask Data for Dev. & Testing Use      Data Masking Pack
            Access Control                       Access Control
           Control Privileged Users             Database Vault
           Multi-factor Authorization           Label Security
            Auditing and Monitoring              Auditing and Monitoring
           Secure Configurations                Configuration Management Pack
           Detect and Audit Mis-use             Audit Vault
           Reverse and undo Damage              Total Recall

            Blocking and Logging                 Blocking and Logging
           Perimeter Defense                    Database Firewall


© 2011 Oracle Corporation                                                       30
Daewoo Securities
          Protecting Against Insider Threats
                                 • Internal threats are major concern in Daewoo Securities.
                                   Several major companies in Korea have experienced data
                                   leaks
              Business
                                 • Daewoo Securities had granted a high number of access
              Challenges           privileges to super users, such as IT administrators.
                                 • Non standard security solutions to protecting the company
                                   data

                                 • Oracle Database
              Solution           • Oracle Database Vault
                                 • Oracle Advance Security

                                 • Protected confidential HR data from being accessed by
                                   privileges users such as IT administrators, while ensuring
              Business Results     they could still login to systems to complete their jobs
                                 • Enhance information protecting by encrypting data in the
                                   database and whenever it leaves the repository


© 2011 Oracle Corporation                                                                       31
Dongguk University
          Automated Audit Data Collection, Improved Security,
          Reduced Costs with Reporting
                            • Students use the system to manage their profiles and timetables
                             online while teachers and staff use it to organize course details and
          Business
                             other important administrative tasks. One of the most important
          Challenges         parts of the deployment was the rollout of an auditing system to
                             provide control over user privilege rights and strengthen security.

                            • Oracle Database
          Solution          • Oracle Real Application Clusters
                            • Oracle Audit Vault

                            • Automated the collection and consolidation of audit data, which
                              lowered the risk of insider security threats
                            • Provided audit controls which verified that only the authorized
                              application user was performing the specified database tasks
          Business          • Made the auditing process easy by providing useful information
          Results             such as user name, corresponding IP addresses, and role in the
                              application
                            • Allowed reports and audit policy functions to be viewed on screen,
                              eliminating the cost and time associated with completing manual
                              audits

© 2011 Oracle Corporation                                                                            32
Cornell University
          Masks all sensitive data used for testing, training and
          development in their PeopleSoft environment
                            • Ensure reliable access to operational and academic systems
          Business
                              across a decentralized IT environment, including PeopleSoft
          Challenges          applications and a Blackboard learning system

                            • Implemented Enterprise Manager to automate monitoring the
                              university‘s IT infrastructure—including databases, middleware,
                              and servers—saving time for IT managers and increasing
          Solution            transparency across the IT infrastructure
                            • Deployed Data Masking Pack as a component within Enterprise
                              Manager (EM) to protect sensitive student info.


                            • Data Masking obfuscated all sensitive data from PeopleSoft
                              environments used for testing, training, and development
          Business
                            • EM enabled Cornell to be more proactive as an IT department—
          Results             preventing or resolving performance problems before they‘re
                              noticed, and in anticipating the needs of students, faculty and staff



© 2011 Oracle Corporation                                                                             33
•   Data Security Trends
        •   How Are Threats Getting In?
        •   What is Maximum Security Architecture
        •   Oracle Solutions Mapped to MSA
        •   Summary
        •   Q&A




© 2011 Oracle Corporation                           34
Oracle Database Security Solutions
         Fits the Maximum Data Security Architecture framework

   •    Comprehensive – single vendor addresses all your requirements
   •    Transparent – no changes to existing applications or databases
   •    Easy to deploy – point-n-click interfaces deliver value within hours
   •    Cost effective – integrated solutions reduce risk and lower TCO
   •    Proven – #1 Database with over 30 years of info security innovation!


               Perimeter          Auditing and          Access           Encryption
               Security           Monitoring            Control          & Masking

 • Database Firewall • Audit Vault               • Database Vault   • Advanced Security
                     • Total Recall              • Label Security   • Secure Backup
                            • Configuration      • Identity         • Data Masking
                              Management           Management

© 2011 Oracle Corporation                                                             35
Part of an End-to-End Security Solution
          Data Security is a key part of the overall Maximum
          Security Architecture that covers your entire IT spectrum

                                                                                     Infrastructure Security


                                                                                     Database Security


                                                                                     Identity Management
       Information

                       Infrastructure                                                Information Rights
                                                                                     Management
                                        Databases

                                                    Applications




© 2011 Oracle Corporation                                      Oracle Confidential                             36
Oracle Security Customers are everywhere

    Financial Services           Transportation & Services




    Manufacturing & Technology   Telecommunication




    Public Sector                Retail




 Oracle Confidential
© 2011 Oracle Corporation                                    37
Because Oracle is #1 and Most Secure


                    Microsoft
                     18.1%           Other
                                     12.6%
        IBM
       20.7%




                                       Oracle
                                       48.6%

                                                               ―Most DBMS vendors offer basic
                                                               security features; Oracle‘s offering
                                                               is most comprehensive.‖

Source: Gartner DataQuest, 2008; Forrester Database Security Market Report, 2009
 © 2011 Oracle Corporation                                                                            38
© 2011 Oracle Corporation   39
© 2011 Oracle Corporation   40

Contenu connexe

Tendances

Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYODstefriche0199
 
Cloud Computing Webinar: Legal &amp; Regulatory Update for 2012
Cloud Computing Webinar: Legal &amp; Regulatory Update for 2012Cloud Computing Webinar: Legal &amp; Regulatory Update for 2012
Cloud Computing Webinar: Legal &amp; Regulatory Update for 2012itandlaw
 
Moving from Records to Engagement to Insight
Moving from Records to Engagement to InsightMoving from Records to Engagement to Insight
Moving from Records to Engagement to InsightJohn Mancini
 
Egress Switch Introduction
Egress Switch IntroductionEgress Switch Introduction
Egress Switch Introductionyonifine
 
Oracle Embedded
Oracle EmbeddedOracle Embedded
Oracle EmbeddedPrem Kumar
 
OpenStack: Time is Now - Lew Tucker
OpenStack: Time is Now - Lew TuckerOpenStack: Time is Now - Lew Tucker
OpenStack: Time is Now - Lew TuckerLew Tucker
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011bluechipper
 
Emmbedding Oracle
Emmbedding OracleEmmbedding Oracle
Emmbedding Oracledidemtopuz
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed servicesPranowo Budi Sulistyo
 

Tendances (16)

Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
101 ab 1445-1515
101 ab 1445-1515101 ab 1445-1515
101 ab 1445-1515
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Cloud Computing Webinar: Legal &amp; Regulatory Update for 2012
Cloud Computing Webinar: Legal &amp; Regulatory Update for 2012Cloud Computing Webinar: Legal &amp; Regulatory Update for 2012
Cloud Computing Webinar: Legal &amp; Regulatory Update for 2012
 
Moving from Records to Engagement to Insight
Moving from Records to Engagement to InsightMoving from Records to Engagement to Insight
Moving from Records to Engagement to Insight
 
Egress Switch Introduction
Egress Switch IntroductionEgress Switch Introduction
Egress Switch Introduction
 
Oracle Embedded
Oracle EmbeddedOracle Embedded
Oracle Embedded
 
OpenStack: Time is Now - Lew Tucker
OpenStack: Time is Now - Lew TuckerOpenStack: Time is Now - Lew Tucker
OpenStack: Time is Now - Lew Tucker
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011
 
Emmbedding Oracle
Emmbedding OracleEmmbedding Oracle
Emmbedding Oracle
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed services
 

Similaire à Talk IT_ Oracle_김상엽_110822

Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idmNormand Sauve
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Avirot Mitamura
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Partnership for the Private Cloud
Partnership for the Private CloudPartnership for the Private Cloud
Partnership for the Private CloudCisco Canada
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
The Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITThe Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITInnoTech
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Fusion Middleware 11g Keynote Foundation For Innovation
Fusion Middleware 11g Keynote Foundation For InnovationFusion Middleware 11g Keynote Foundation For Innovation
Fusion Middleware 11g Keynote Foundation For InnovationMark Rabne
 
Mergers & Acquisitions
Mergers & AcquisitionsMergers & Acquisitions
Mergers & Acquisitionsdmurph4
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.CIOEastAfrica
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
2011 ADC Security Survey—Global Findings
2011 ADC Security Survey—Global Findings 2011 ADC Security Survey—Global Findings
2011 ADC Security Survey—Global Findings F5 Networks
 
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityExtending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityJerome Leonard
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationBob Rhubart
 

Similaire à Talk IT_ Oracle_김상엽_110822 (20)

On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idm
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 
Centrify Intellect event
Centrify   Intellect eventCentrify   Intellect event
Centrify Intellect event
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Partnership for the Private Cloud
Partnership for the Private CloudPartnership for the Private Cloud
Partnership for the Private Cloud
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
The Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand ITThe Rise of Big Data and On-Demand IT
The Rise of Big Data and On-Demand IT
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Fusion Middleware 11g Keynote Foundation For Innovation
Fusion Middleware 11g Keynote Foundation For InnovationFusion Middleware 11g Keynote Foundation For Innovation
Fusion Middleware 11g Keynote Foundation For Innovation
 
Mergers & Acquisitions
Mergers & AcquisitionsMergers & Acquisitions
Mergers & Acquisitions
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
 
Corporate overview the services story
Corporate overview the services storyCorporate overview the services story
Corporate overview the services story
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Antonio piraino v1
Antonio piraino v1Antonio piraino v1
Antonio piraino v1
 
2011 ADC Security Survey—Global Findings
2011 ADC Security Survey—Global Findings 2011 ADC Security Survey—Global Findings
2011 ADC Security Survey—Global Findings
 
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityExtending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
 
Infrastructure Consolidation and Virtualization
Infrastructure Consolidation and VirtualizationInfrastructure Consolidation and Virtualization
Infrastructure Consolidation and Virtualization
 

Plus de Cana Ko

북Tv365_쓰고 상상하고 실행하라_문준호_111207
북Tv365_쓰고 상상하고 실행하라_문준호_111207북Tv365_쓰고 상상하고 실행하라_문준호_111207
북Tv365_쓰고 상상하고 실행하라_문준호_111207Cana Ko
 
북Tv365 나는 영화가 좋다 이창세_111130
북Tv365 나는 영화가 좋다 이창세_111130북Tv365 나는 영화가 좋다 이창세_111130
북Tv365 나는 영화가 좋다 이창세_111130Cana Ko
 
북Tv365_10년의 기다림 김창수_111123
북Tv365_10년의 기다림 김창수_111123북Tv365_10년의 기다림 김창수_111123
북Tv365_10년의 기다림 김창수_111123Cana Ko
 
북Tv365 서른 life 사전 이재은_111116
북Tv365 서른 life 사전 이재은_111116북Tv365 서른 life 사전 이재은_111116
북Tv365 서른 life 사전 이재은_111116Cana Ko
 
북Tv365_책에 미친 청춘_김애리_111102
북Tv365_책에 미친 청춘_김애리_111102북Tv365_책에 미친 청춘_김애리_111102
북Tv365_책에 미친 청춘_김애리_111102Cana Ko
 
북Tv365 책에 미친 청춘 김애리_111102
북Tv365 책에 미친 청춘 김애리_111102북Tv365 책에 미친 청춘 김애리_111102
북Tv365 책에 미친 청춘 김애리_111102Cana Ko
 
북Tv365 책에 미친 청춘 김애리_111102
북Tv365 책에 미친 청춘 김애리_111102북Tv365 책에 미친 청춘 김애리_111102
북Tv365 책에 미친 청춘 김애리_111102Cana Ko
 
Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Cana Ko
 
Talk IT_CA_정성엽_111028
Talk IT_CA_정성엽_111028Talk IT_CA_정성엽_111028
Talk IT_CA_정성엽_111028Cana Ko
 
북포럼 227회 재즈스타일 전진용 111026
북포럼 227회 재즈스타일 전진용 111026북포럼 227회 재즈스타일 전진용 111026
북포럼 227회 재즈스타일 전진용 111026Cana Ko
 
Talk IT_ IBM_나병준_111025_Session2
Talk IT_ IBM_나병준_111025_Session2Talk IT_ IBM_나병준_111025_Session2
Talk IT_ IBM_나병준_111025_Session2Cana Ko
 
111025 session 1
111025 session 1111025 session 1
111025 session 1Cana Ko
 
Talk IT_ Oracle_정봉기_111025
Talk IT_ Oracle_정봉기_111025Talk IT_ Oracle_정봉기_111025
Talk IT_ Oracle_정봉기_111025Cana Ko
 
북포럼_화난 원숭이들은 모두 어디로 갔을까_ 송인혁_ 111019
북포럼_화난 원숭이들은 모두 어디로 갔을까_ 송인혁_ 111019북포럼_화난 원숭이들은 모두 어디로 갔을까_ 송인혁_ 111019
북포럼_화난 원숭이들은 모두 어디로 갔을까_ 송인혁_ 111019Cana Ko
 
북포럼_고민이 없다면 20대가 아니다_고영혁_111012
북포럼_고민이 없다면 20대가 아니다_고영혁_111012북포럼_고민이 없다면 20대가 아니다_고영혁_111012
북포럼_고민이 없다면 20대가 아니다_고영혁_111012Cana Ko
 
Talk IT_ Oracle_최대진_111012
Talk IT_ Oracle_최대진_111012Talk IT_ Oracle_최대진_111012
Talk IT_ Oracle_최대진_111012Cana Ko
 
Talk IT_ Oracle_전태준_111012
Talk IT_ Oracle_전태준_111012Talk IT_ Oracle_전태준_111012
Talk IT_ Oracle_전태준_111012Cana Ko
 
Talk IT_ Agilent_최석근_111007
Talk IT_ Agilent_최석근_111007Talk IT_ Agilent_최석근_111007
Talk IT_ Agilent_최석근_111007Cana Ko
 
북포럼_1초에 가슴을 울려라_ 최병광_111005
북포럼_1초에 가슴을 울려라_ 최병광_111005북포럼_1초에 가슴을 울려라_ 최병광_111005
북포럼_1초에 가슴을 울려라_ 최병광_111005Cana Ko
 
Talk IT_ CA_조상원_110930
Talk IT_ CA_조상원_110930Talk IT_ CA_조상원_110930
Talk IT_ CA_조상원_110930Cana Ko
 

Plus de Cana Ko (20)

북Tv365_쓰고 상상하고 실행하라_문준호_111207
북Tv365_쓰고 상상하고 실행하라_문준호_111207북Tv365_쓰고 상상하고 실행하라_문준호_111207
북Tv365_쓰고 상상하고 실행하라_문준호_111207
 
북Tv365 나는 영화가 좋다 이창세_111130
북Tv365 나는 영화가 좋다 이창세_111130북Tv365 나는 영화가 좋다 이창세_111130
북Tv365 나는 영화가 좋다 이창세_111130
 
북Tv365_10년의 기다림 김창수_111123
북Tv365_10년의 기다림 김창수_111123북Tv365_10년의 기다림 김창수_111123
북Tv365_10년의 기다림 김창수_111123
 
북Tv365 서른 life 사전 이재은_111116
북Tv365 서른 life 사전 이재은_111116북Tv365 서른 life 사전 이재은_111116
북Tv365 서른 life 사전 이재은_111116
 
북Tv365_책에 미친 청춘_김애리_111102
북Tv365_책에 미친 청춘_김애리_111102북Tv365_책에 미친 청춘_김애리_111102
북Tv365_책에 미친 청춘_김애리_111102
 
북Tv365 책에 미친 청춘 김애리_111102
북Tv365 책에 미친 청춘 김애리_111102북Tv365 책에 미친 청춘 김애리_111102
북Tv365 책에 미친 청춘 김애리_111102
 
북Tv365 책에 미친 청춘 김애리_111102
북Tv365 책에 미친 청춘 김애리_111102북Tv365 책에 미친 청춘 김애리_111102
북Tv365 책에 미친 청춘 김애리_111102
 
Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102
 
Talk IT_CA_정성엽_111028
Talk IT_CA_정성엽_111028Talk IT_CA_정성엽_111028
Talk IT_CA_정성엽_111028
 
북포럼 227회 재즈스타일 전진용 111026
북포럼 227회 재즈스타일 전진용 111026북포럼 227회 재즈스타일 전진용 111026
북포럼 227회 재즈스타일 전진용 111026
 
Talk IT_ IBM_나병준_111025_Session2
Talk IT_ IBM_나병준_111025_Session2Talk IT_ IBM_나병준_111025_Session2
Talk IT_ IBM_나병준_111025_Session2
 
111025 session 1
111025 session 1111025 session 1
111025 session 1
 
Talk IT_ Oracle_정봉기_111025
Talk IT_ Oracle_정봉기_111025Talk IT_ Oracle_정봉기_111025
Talk IT_ Oracle_정봉기_111025
 
북포럼_화난 원숭이들은 모두 어디로 갔을까_ 송인혁_ 111019
북포럼_화난 원숭이들은 모두 어디로 갔을까_ 송인혁_ 111019북포럼_화난 원숭이들은 모두 어디로 갔을까_ 송인혁_ 111019
북포럼_화난 원숭이들은 모두 어디로 갔을까_ 송인혁_ 111019
 
북포럼_고민이 없다면 20대가 아니다_고영혁_111012
북포럼_고민이 없다면 20대가 아니다_고영혁_111012북포럼_고민이 없다면 20대가 아니다_고영혁_111012
북포럼_고민이 없다면 20대가 아니다_고영혁_111012
 
Talk IT_ Oracle_최대진_111012
Talk IT_ Oracle_최대진_111012Talk IT_ Oracle_최대진_111012
Talk IT_ Oracle_최대진_111012
 
Talk IT_ Oracle_전태준_111012
Talk IT_ Oracle_전태준_111012Talk IT_ Oracle_전태준_111012
Talk IT_ Oracle_전태준_111012
 
Talk IT_ Agilent_최석근_111007
Talk IT_ Agilent_최석근_111007Talk IT_ Agilent_최석근_111007
Talk IT_ Agilent_최석근_111007
 
북포럼_1초에 가슴을 울려라_ 최병광_111005
북포럼_1초에 가슴을 울려라_ 최병광_111005북포럼_1초에 가슴을 울려라_ 최병광_111005
북포럼_1초에 가슴을 울려라_ 최병광_111005
 
Talk IT_ CA_조상원_110930
Talk IT_ CA_조상원_110930Talk IT_ CA_조상원_110930
Talk IT_ CA_조상원_110930
 

Dernier

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 

Dernier (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 

Talk IT_ Oracle_김상엽_110822

  • 1. © 2011 Oracle Corporation
  • 2. <Insert Picture Here> Protect Your Most Sensitive Data Build a Maximum Security Architecture Ryan Kim | Senior Manager, Technology Readiness and Developer Program 2
  • 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle‘s products remains at the sole discretion of Oracle. © 2011 Oracle Corporation 3
  • 4. Agenda • Data Security Trends • How Are Threats Getting In? • What is Maximum Security Architecture • Oracle Solutions Mapped to MSA • Summary • Q&A © 2011 Oracle Corporation 4
  • 5. More data than ever… Growth Doubles Yearly 1,800 Exabytes 2006 2011 Source: IDC, 2008 © 2011 Oracle Corporation Oracle Confidential 5
  • 6. More breaches than ever… Data Breach Once exposed, the data is out there – the bell can’t be un-rung PUBLICLY REPORTED DATA BREACHES 400 300 630% Increase 200 100 Total Personally Identifying Information Records Exposed 0 (Millions) 2005 2006 2007 2008 Average cost of a data breach $202 per record Average total cost exceeds $6.6 million per breach Source: DataLossDB, Ponemon Institute, 2009 © 2011 Oracle Corporation Oracle Confidential 6
  • 7. More threats than ever… 70% attacks originate inside the perimeter 90% attacks perpetrated by employees with privileged access © 2011 Oracle Corporation Oracle Confidential 7
  • 8. More regulations than ever… • Federal, state, local, industry…adding more mandates every year! • Need to meet AND demonstrate compliance • Compliance costs are unsustainable ? Report and audit 90% Companies behind in compliance Source: IT Policy Compliance Group, 2007. © 2011 Oracle Corporation 8
  • 9. Compliance • 현행 개인정보 보호 법률 체계 구분 개별 법률 적용대상 소관부처 공공 부문 공공기관의 개인정보보호법 공공기관 행정안전부 민간 정보통신 정보통신망법 정보통신서비스제공자 방송통신위원회 부문 금융/신용 신용정보법 신용정보 제공/이용자 금융위원회 • 개인정보 보호법 ( 2011년 9월 시행) • 온라인/오프라인 상관없이 모든 업종에 걸쳐 적용. 공공기관의 • 정보통신망법과 신용정보법은 그대로 유지. 공공 개인정보보호법 개 • 정보통신망법과 신용정보법이 통신사업자와 인 금융기관에 먼저 적용되고 동 법률들에서 규정하지 않는 조항에 대해 개인정보 보호법이 적용됨 통신 정 정보통신망법 보 • 정보통신망법의 적용을 받던 통신 사업자이외의 준용사업자는 모두 망법 에서 삭제되고 개인정보 보 보호법의 직접 적용을 받음 금융 호 신용정보법 법 기타 © 2011 Oracle Corporation 9
  • 10. Higher Costs Than Ever… • User Management Costs • User Productivity Costs • Compliance & Remediation Costs • Security Breach Remediation Costs $ It Adds Up © 2011 Oracle Corporation 10
  • 11. Biggest Barrier to Cloud Computing Adoption? Security! 74% 74% rate cloud security issues as ―very significant‖ Source: IDC © 2011 Oracle Corporation 11
  • 12. Data Security Trends • How Are Threats Getting In? • What is Maximum Security Architecture • Oracle Solutions Mapped to MSA • Summary • Q&A © 2011 Oracle Corporation 12
  • 13. Over 900M Breached Records Resulted from Compromised Database Servers Type Category % Breaches % Records Database Server Servers & Applications 25% 92% Desktop Computer End-User Devices 21% 1% Verizon 2010 Data Breach Investigations Report © 2011 Oracle Corporation 13
  • 14. SQL Injection Attacks Against Databases Responsible for 89% of Breached Data • SQL injection is a technique for controlling responses from the database server through the web application • It can‘t be fixed by simply applying a patch, tweaking a setting, or changing a single page • SQL injection vulnerabilities are endemic, and to fix them you have to overhaul all your code. ―The versatility and effectiveness of SQL Injection make it a multi-tool of choice among cybercriminals.‖ Verizon 2010 Data Breach Investigations Report © 2011 Oracle Corporation 14
  • 15. 66% Organizations Vulnerable to SQL Injection Attacks Taken steps to prevent SQL injection attacks? 2010 IOUG Data Security Survey Report © 2011 Oracle Corporation 15
  • 16. Traditional Security Solutions Leave Data within Databases Vulnerable Key Loggers Malware SQL Injection Espionage Spear Phishing Botware Social Engineering Database Applications Database Users and Administrators Maximum Security Architecture Protects Your Most Sensitive Area: Your Data © 2011 Oracle Corporation 16
  • 17. Data Security Trends • How Are Threats Getting In? • What is Maximum Security Architecture • Oracle Solutions Mapped to MSA • Summary • Q&A © 2011 Oracle Corporation 17
  • 18. Maximum Security Architecture Safeguards your Information Technology environment at every layer, leaving no weak link Infrastructure Security • Network Security • Hardware Security • OS / Firmware Security • Virtualization Security Database Security Identity Management • User Provisioning • Role Management Information • Entitlements Management Infrastructure • Risk-Based Access Control • Virtual Directories Databases Applications Information Rights Content Management • Track and Audit Document Usage Today we will focus on Maximum DATA • Control & Revoke Document Access • Secured Inside or Outside Firewall Security Architecture for the Database tier • Centralized Policy Administration © 2011 Oracle Corporation Oracle Confidential 18
  • 19. Maximum Data Security Architecture 1. Perimeter Defense 2. Monitoring Detect & Audit Mis-use Reverse Secure & Undo Configuration Damage 3. Access Control Privileged Multi-factor User Authorization Controls 4. Encryption & Masking Mask Data Encrypt Used in Dev. Data In- Protect Data & Testing Transit Backups © 2011 Oracle Corporation 19
  • 20. Oracle Configuration Management Vulnerability Assessment & Secure Configuration Discover Classify Assess Prioritize Fix Monitor Asset Configuration Policy Vulnerability Analysis & Management Management Management Management Analytics & Audit REQUIREMENTS: 1. Discovers Databases, OS, Hosts, remote end-points, apps & apps servers 2. Continuous scanning vs. 375+ best practices & industry standards, extensible 3. Detect, prevent and roll-back unauthorized configuration changes real time 4. Change management compliance reports 5. Platform & vendor agnostic © 2011 Oracle Corporation 20
  • 21. Detection & Auditing Against Mis-use Automated Activity Monitoring & Audit Reporting HR Data ! Alerts Built-in CRM Data Reports Audit Data Custom ERP Data Reports Policies Databases Auditor REQUIREMENTS: 1. Automated Oracle and non-Oracle database activity monitoring 2. Detect and alert on suspicious activities 3. Out-of-the box compliance reports 4. Custom forensic reports 5. Centralized management of audit policies (SOX, custom, etc.) © 2011 Oracle Corporation 21
  • 22. Reverse and Undo Damaged Data Secure Change Tracking select salary from emp AS OF TIMESTAMP '02-MAY-09 12.00 AM‗ where emp.title = ‗admin‘ REQUIREMENTS: 1. Transparently track data changes 2. Efficient, tamper-resistant storage of archives 3. Real-time access to historical data 4. Simplified forensics and error correction 5. Ability to roll-back and undo damaged records, eliminating problems © 2011 Oracle Corporation 22
  • 23. Separation of Duties Privileged User Access Control and Multifactor Authorization Procurement DBA HR Application Finance select * from finance.customers REQUIREMENTS: 1. Keep privileged database users from abusing their powers 2. Address Separation of Duties requirements 3. Enforce security policies and block unauthorized database activities 4. Prevent application by-pass to protect application data 5. Securely consolidate application data 6. Requires no application changes © 2011 Oracle Corporation 23
  • 24. Prevent Unauthorized Insider Access Data Classification for Access Control Sensitive Transactions Confidential Report Data Public Reports Confidential Sensitive REQUIREMENTS: 1. Classify users and data based on business drivers 2. Database enforced row level access control 3. Users classification through Oracle Identity Management Suite 4. Classification labels can be factors in other policies 5. Certified with Oracle Database and is application agnostic © 2011 Oracle Corporation 24
  • 25. Encrypt Sensitive or In-transit Data Comprehensive Standards-Based Encryption Disk Backups Exports Off-Site Facilities REQUIREMENTS: 1. Transparent data at rest encryption 2. Data stays encrypted when backed up 3. Encryption for data in transit 4. Strong authentication of users and servers 5. Certified with Oracle Database © 2011 Oracle Corporation 25
  • 26. Securely Backup & Store Data Archives Integrated Tape or Cloud Backup Management REQUIREMENTS: 1. Secure data archival to tape or cloud 2. Easy to administer key management 3. Fastest Oracle Database tape backups 4. Leverage low-cost cloud storage © 2011 Oracle Corporation 26
  • 27. Mask data used in development & test Irreversible De-Identification Production Non-Production LAST_NAME SSN SALARY LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 ANSKEKSL 111—23-1111 60,000 BENSON 323-22-2943 60,000 BKJHHEIEDK 222-34-1345 40,000 REQUIREMENTS: 1. Remove sensitive data from non-production databases 2. Referential integrity preserved so applications continue to work 3. Sensitive data never leaves the database 4. Extensible template library and policies for automation 5. Supports heterogeneous Database envrionments © 2011 Oracle Corporation 27
  • 28. Application of MSA to Safeguard your Data Recap of how to secure your business’ most valuable asset Encryption and Masking Encrypt Sensitive & In-transit Data Protect Data Back-ups Mask Data for Dev. & Testing Use Access Control Control Privileged Users Multi-factor Authorization Auditing and Monitoring Secure Configurations Encryption & Masking Detect and Audit Mis-use Reverse and undo Damage Access Control Auditing & Monitoring Blocking and Logging Blocking & Logging Perimeter Defense © 2011 Oracle Corporation 28
  • 29. Data Security Trends • How Are Threats Getting In? • What is Maximum Security Architecture • Oracle Solutions Mapped to MSA • Summary • Q&A © 2011 Oracle Corporation 29
  • 30. Oracle Solutions Mapped to MSA Integrated products to deliver MSA capabilities for your Databases Encryption and Masking Encryption and Masking Encrypt Sensitive & In-transit Data Advanced Security Option Protect Data Back-ups Secure Back-up Mask Data for Dev. & Testing Use Data Masking Pack Access Control Access Control Control Privileged Users Database Vault Multi-factor Authorization Label Security Auditing and Monitoring Auditing and Monitoring Secure Configurations Configuration Management Pack Detect and Audit Mis-use Audit Vault Reverse and undo Damage Total Recall Blocking and Logging Blocking and Logging Perimeter Defense Database Firewall © 2011 Oracle Corporation 30
  • 31. Daewoo Securities Protecting Against Insider Threats • Internal threats are major concern in Daewoo Securities. Several major companies in Korea have experienced data leaks Business • Daewoo Securities had granted a high number of access Challenges privileges to super users, such as IT administrators. • Non standard security solutions to protecting the company data • Oracle Database Solution • Oracle Database Vault • Oracle Advance Security • Protected confidential HR data from being accessed by privileges users such as IT administrators, while ensuring Business Results they could still login to systems to complete their jobs • Enhance information protecting by encrypting data in the database and whenever it leaves the repository © 2011 Oracle Corporation 31
  • 32. Dongguk University Automated Audit Data Collection, Improved Security, Reduced Costs with Reporting • Students use the system to manage their profiles and timetables online while teachers and staff use it to organize course details and Business other important administrative tasks. One of the most important Challenges parts of the deployment was the rollout of an auditing system to provide control over user privilege rights and strengthen security. • Oracle Database Solution • Oracle Real Application Clusters • Oracle Audit Vault • Automated the collection and consolidation of audit data, which lowered the risk of insider security threats • Provided audit controls which verified that only the authorized application user was performing the specified database tasks Business • Made the auditing process easy by providing useful information Results such as user name, corresponding IP addresses, and role in the application • Allowed reports and audit policy functions to be viewed on screen, eliminating the cost and time associated with completing manual audits © 2011 Oracle Corporation 32
  • 33. Cornell University Masks all sensitive data used for testing, training and development in their PeopleSoft environment • Ensure reliable access to operational and academic systems Business across a decentralized IT environment, including PeopleSoft Challenges applications and a Blackboard learning system • Implemented Enterprise Manager to automate monitoring the university‘s IT infrastructure—including databases, middleware, and servers—saving time for IT managers and increasing Solution transparency across the IT infrastructure • Deployed Data Masking Pack as a component within Enterprise Manager (EM) to protect sensitive student info. • Data Masking obfuscated all sensitive data from PeopleSoft environments used for testing, training, and development Business • EM enabled Cornell to be more proactive as an IT department— Results preventing or resolving performance problems before they‘re noticed, and in anticipating the needs of students, faculty and staff © 2011 Oracle Corporation 33
  • 34. Data Security Trends • How Are Threats Getting In? • What is Maximum Security Architecture • Oracle Solutions Mapped to MSA • Summary • Q&A © 2011 Oracle Corporation 34
  • 35. Oracle Database Security Solutions Fits the Maximum Data Security Architecture framework • Comprehensive – single vendor addresses all your requirements • Transparent – no changes to existing applications or databases • Easy to deploy – point-n-click interfaces deliver value within hours • Cost effective – integrated solutions reduce risk and lower TCO • Proven – #1 Database with over 30 years of info security innovation! Perimeter Auditing and Access Encryption Security Monitoring Control & Masking • Database Firewall • Audit Vault • Database Vault • Advanced Security • Total Recall • Label Security • Secure Backup • Configuration • Identity • Data Masking Management Management © 2011 Oracle Corporation 35
  • 36. Part of an End-to-End Security Solution Data Security is a key part of the overall Maximum Security Architecture that covers your entire IT spectrum Infrastructure Security Database Security Identity Management Information Infrastructure Information Rights Management Databases Applications © 2011 Oracle Corporation Oracle Confidential 36
  • 37. Oracle Security Customers are everywhere Financial Services Transportation & Services Manufacturing & Technology Telecommunication Public Sector Retail Oracle Confidential © 2011 Oracle Corporation 37
  • 38. Because Oracle is #1 and Most Secure Microsoft 18.1% Other 12.6% IBM 20.7% Oracle 48.6% ―Most DBMS vendors offer basic security features; Oracle‘s offering is most comprehensive.‖ Source: Gartner DataQuest, 2008; Forrester Database Security Market Report, 2009 © 2011 Oracle Corporation 38
  • 39. © 2011 Oracle Corporation 39
  • 40. © 2011 Oracle Corporation 40