While the previous sections discussed proactive security measures, such as the granting of permissions and role-based security, there is also a time and a place for retroactive security measures. In the growing field of computer forensics, data collected during an attack becomes invaluable in determining the chain of events involved and learning the extent of the attack. In Oracle, the primary forensic tool available to us is auditing. Auditing is the act of recording a historical chain of events for various operations that take place in the database. Audi...
- Understanding auditing
- from OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide
- Publisher: Packt Publishing
- Released: February 2013
Share this highlighthttp://www.safaribooksonline.com/a/oca-oracle-database/1312412/