Chapter 10

Securing and Auditing Your Database

In This Chapter

arrow Verifying identities through authentication

arrow Granting privileges to users

arrow Creating roles

arrow Auditing the database

Security is an especially important concern when dealing with anything relating to computers and the Internet. As an administrator of software applications such as the Oracle database, you are concerned with security because you want to protect your data. Security is vital because you don’t want the wrong people looking at the data and because you need to protect the data from being altered or corrupted. Being able to restrict and monitor the users in the system helps you provide a safe and secure operating environment for you and your customers or clients.

Staying Authentic with Authentication

Authentication is all about making sure your users are who they say they are. This process begins well before users even try to access the database. You need to set up a system or process that allows you to verify users’ identity. You also need a method for users to access the system that both identifies them and restricts ...

Get Oracle® 12c For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.