Security Overview
Số trang: 174
Loại file: pdf
Dung lượng: 1.01 MB
Lượt xem: 12
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Oracle Security Overview presents the basic concepts of data security in an Internetenvironment. It outlines fundamental data security requirements and explains therisks that threaten the integrity and privacy of your data. Several chapters introducethe rich array of technology that can contribute to system security. The bookconcludes with a survey of the Oracle features and products that implement thesetechnologies.
Nội dung trích xuất từ tài liệu:
Security OverviewOracle®Security Overview10g Release 1 (10.1)Part No. B10777-01December 2003Oracle Security Overview 10g Release 1 (10.1)Part No. B10777-01Copyright © 2000, 2003 Oracle Corporation. All rights reserved.Primary Author: Rita Moran and Jeff LevingerThe Programs (which include both the software and documentation) contain proprietary information ofOracle Corporation; they are provided under a license agreement containing restrictions on use anddisclosure and are also protected by copyright, patent and other intellectual and industrial propertylaws. Reverse engineering, disassembly or decompilation of the Programs, except to the extent requiredto obtain interoperability with other independently created software or as specified by law, is prohibited.The information contained in this document is subject to change without notice. If you find any problemsin the documentation, please report them to us in writing. Oracle Corporation does not warrant that thisdocument is error-free. Except as may be expressly permitted in your license agreement for thesePrograms, no part of these Programs may be reproduced or transmitted in any form or by any means,electronic or mechanical, for any purpose, without the express written permission of Oracle Corporation.If the Programs are delivered to the U.S. Government or anyone licensing or using the programs onbehalf of the U.S. Government, the following notice is applicable:Restricted Rights Notice Programs delivered subject to the DOD FAR Supplement are commercialcomputer software and use, duplication, and disclosure of the Programs, including documentation,shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement.Otherwise, Programs delivered subject to the Federal Acquisition Regulations are restricted computersoftware and use, duplication, and disclosure of the Programs shall be subject to the restrictions in FAR52.227-19, Commercial Computer Software - Restricted Rights (June, 1987). Oracle Corporation, 500Oracle Parkway, Redwood City, CA 94065.The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherentlydangerous applications. It shall be the licensees responsibility to take all appropriate fail-safe, backup,redundancy, and other measures to ensure the safe use of such applications if the Programs are used forsuch purposes, and Oracle Corporation disclaims liability for any damages caused by such use of thePrograms.Oracle is a registered trademark, and Oracle Store, Oracle7, Oracle8i, Oracle9i, PL/SQL, SQL*Plus, andSecure Network Services are trademarks or registered trademarks of Oracle Corporation. Other namesmay be trademarks of their respective owners. ContentsSend Us Your Comments ................................................................................................................. xiiiPreface........................................................................................................................................................... xv Audience ................................................................................................................................................ xv Documentation Accessibility ............................................................................................................. xvi Organization......................................................................................................................................... xvi Related Documentation .................................................................................................................... xviii Conventions.......................................................................................................................................... xixPart I Security Challenges1 Data Security Challenges Top Security Myths............................................................................................................................. 1-2 Understanding the Many Dimensions of System Security........................................................ 1-2 Fundamental Data Security Requirements.................................................................................... 1-4 Confidentiality .............................................................................................................................. 1-4 Privacy of Communications................................................................................................. 1-5 Secure Storage of Sensitive Data ......................................................................................... 1-5 Authenticated Users.............................................................................................................. 1-5 Granular Access Control ...................................................................................................... 1-5 Integrity.......................................................................................................................................... 1-6 Availability .................................................................................................................................... 1-6 Security Requirements in the Internet Environment ................................................................ ...
Nội dung trích xuất từ tài liệu:
Security OverviewOracle®Security Overview10g Release 1 (10.1)Part No. B10777-01December 2003Oracle Security Overview 10g Release 1 (10.1)Part No. B10777-01Copyright © 2000, 2003 Oracle Corporation. All rights reserved.Primary Author: Rita Moran and Jeff LevingerThe Programs (which include both the software and documentation) contain proprietary information ofOracle Corporation; they are provided under a license agreement containing restrictions on use anddisclosure and are also protected by copyright, patent and other intellectual and industrial propertylaws. Reverse engineering, disassembly or decompilation of the Programs, except to the extent requiredto obtain interoperability with other independently created software or as specified by law, is prohibited.The information contained in this document is subject to change without notice. If you find any problemsin the documentation, please report them to us in writing. Oracle Corporation does not warrant that thisdocument is error-free. Except as may be expressly permitted in your license agreement for thesePrograms, no part of these Programs may be reproduced or transmitted in any form or by any means,electronic or mechanical, for any purpose, without the express written permission of Oracle Corporation.If the Programs are delivered to the U.S. Government or anyone licensing or using the programs onbehalf of the U.S. Government, the following notice is applicable:Restricted Rights Notice Programs delivered subject to the DOD FAR Supplement are commercialcomputer software and use, duplication, and disclosure of the Programs, including documentation,shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement.Otherwise, Programs delivered subject to the Federal Acquisition Regulations are restricted computersoftware and use, duplication, and disclosure of the Programs shall be subject to the restrictions in FAR52.227-19, Commercial Computer Software - Restricted Rights (June, 1987). Oracle Corporation, 500Oracle Parkway, Redwood City, CA 94065.The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherentlydangerous applications. It shall be the licensees responsibility to take all appropriate fail-safe, backup,redundancy, and other measures to ensure the safe use of such applications if the Programs are used forsuch purposes, and Oracle Corporation disclaims liability for any damages caused by such use of thePrograms.Oracle is a registered trademark, and Oracle Store, Oracle7, Oracle8i, Oracle9i, PL/SQL, SQL*Plus, andSecure Network Services are trademarks or registered trademarks of Oracle Corporation. Other namesmay be trademarks of their respective owners. ContentsSend Us Your Comments ................................................................................................................. xiiiPreface........................................................................................................................................................... xv Audience ................................................................................................................................................ xv Documentation Accessibility ............................................................................................................. xvi Organization......................................................................................................................................... xvi Related Documentation .................................................................................................................... xviii Conventions.......................................................................................................................................... xixPart I Security Challenges1 Data Security Challenges Top Security Myths............................................................................................................................. 1-2 Understanding the Many Dimensions of System Security........................................................ 1-2 Fundamental Data Security Requirements.................................................................................... 1-4 Confidentiality .............................................................................................................................. 1-4 Privacy of Communications................................................................................................. 1-5 Secure Storage of Sensitive Data ......................................................................................... 1-5 Authenticated Users.............................................................................................................. 1-5 Granular Access Control ...................................................................................................... 1-5 Integrity.......................................................................................................................................... 1-6 Availability .................................................................................................................................... 1-6 Security Requirements in the Internet Environment ................................................................ ...
Tài liệu có liên quan:
-
52 trang 468 1 0
-
62 trang 422 3 0
-
Đề thi kết thúc học phần học kì 2 môn Cơ sở dữ liệu năm 2019-2020 có đáp án - Trường ĐH Đồng Tháp
5 trang 388 6 0 -
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 367 0 0 -
13 trang 342 0 0
-
96 trang 334 0 0
-
74 trang 329 0 0
-
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 321 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 321 1 0 -
Giáo trình Cơ sở dữ liệu: Phần 2 - TS. Nguyễn Hoàng Sơn
158 trang 319 0 0