Chapter 8. Tracking and Analysis: Database Auditing

In this chapter we will cover:

  • Determining how and where to generate audit information
  • Auditing sessions
  • Auditing statements
  • Auditing objects
  • Auditing privileges
  • Implementing fine-grained auditing
  • Integrating Oracle audit with SYSLOG
  • Auditing SYS administrative users

Introduction

No matter how secure a system is there will always exist a risk: it can be penetrated by an outsider that has gained access or compromised by an insider that has misused their access privileges. In cases like this, one way to detect the origin of the attack or the source of the inappropriate data access or modification is to implement sensible data audits. Therefore, it is important to emphasize the necessity of implementing appropriate ...

Get Oracle 11g Anti-hacker's Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.