Danh mục tài liệu

Security Overview

Số trang: 174      Loại file: pdf      Dung lượng: 1.01 MB      Lượt xem: 12      Lượt tải: 0    
Xem trước 10 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

Oracle Security Overview presents the basic concepts of data security in an Internetenvironment. It outlines fundamental data security requirements and explains therisks that threaten the integrity and privacy of your data. Several chapters introducethe rich array of technology that can contribute to system security. The bookconcludes with a survey of the Oracle features and products that implement thesetechnologies.
Nội dung trích xuất từ tài liệu:
Security OverviewOracle®Security Overview10g Release 1 (10.1)Part No. B10777-01December 2003Oracle Security Overview 10g Release 1 (10.1)Part No. B10777-01Copyright © 2000, 2003 Oracle Corporation. All rights reserved.Primary Author: Rita Moran and Jeff LevingerThe Programs (which include both the software and documentation) contain proprietary information ofOracle Corporation; they are provided under a license agreement containing restrictions on use anddisclosure and are also protected by copyright, patent and other intellectual and industrial propertylaws. Reverse engineering, disassembly or decompilation of the Programs, except to the extent requiredto obtain interoperability with other independently created software or as specified by law, is prohibited.The information contained in this document is subject to change without notice. If you find any problemsin the documentation, please report them to us in writing. Oracle Corporation does not warrant that thisdocument is error-free. Except as may be expressly permitted in your license agreement for thesePrograms, no part of these Programs may be reproduced or transmitted in any form or by any means,electronic or mechanical, for any purpose, without the express written permission of Oracle Corporation.If the Programs are delivered to the U.S. Government or anyone licensing or using the programs onbehalf of the U.S. Government, the following notice is applicable:Restricted Rights Notice Programs delivered subject to the DOD FAR Supplement are commercialcomputer software and use, duplication, and disclosure of the Programs, including documentation,shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement.Otherwise, Programs delivered subject to the Federal Acquisition Regulations are restricted computersoftware and use, duplication, and disclosure of the Programs shall be subject to the restrictions in FAR52.227-19, Commercial Computer Software - Restricted Rights (June, 1987). Oracle Corporation, 500Oracle Parkway, Redwood City, CA 94065.The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherentlydangerous applications. It shall be the licensees responsibility to take all appropriate fail-safe, backup,redundancy, and other measures to ensure the safe use of such applications if the Programs are used forsuch purposes, and Oracle Corporation disclaims liability for any damages caused by such use of thePrograms.Oracle is a registered trademark, and Oracle Store, Oracle7, Oracle8i, Oracle9i, PL/SQL, SQL*Plus, andSecure Network Services are trademarks or registered trademarks of Oracle Corporation. Other namesmay be trademarks of their respective owners. ContentsSend Us Your Comments ................................................................................................................. xiiiPreface........................................................................................................................................................... xv Audience ................................................................................................................................................ xv Documentation Accessibility ............................................................................................................. xvi Organization......................................................................................................................................... xvi Related Documentation .................................................................................................................... xviii Conventions.......................................................................................................................................... xixPart I Security Challenges1 Data Security Challenges Top Security Myths............................................................................................................................. 1-2 Understanding the Many Dimensions of System Security........................................................ 1-2 Fundamental Data Security Requirements.................................................................................... 1-4 Confidentiality .............................................................................................................................. 1-4 Privacy of Communications................................................................................................. 1-5 Secure Storage of Sensitive Data ......................................................................................... 1-5 Authenticated Users.............................................................................................................. 1-5 Granular Access Control ...................................................................................................... 1-5 Integrity.......................................................................................................................................... 1-6 Availability .................................................................................................................................... 1-6 Security Requirements in the Internet Environment ................................................................ ...

Tài liệu có liên quan: