The goal of this book has been to provide you with the background and examples to implement a reasonable degree of security within your Oracle database, based on the software Oracle delivers by default. For example, it describes how you can use roles and views to control user access to different areas of the database, limit access to your operating system files, and implement auditing to further protect your data and database.
The topics discussed in this chapter go beyond the basic security available in the standard Oracle database. Oracle Corporation provides several products that offer additional security at an additional cost. Here we provide a brief discussion of these Oracle products so you will have an idea of other options available to protect your databases:
Trusted Oracle (TO)
The Advanced Networking Option (ANO)
The Oracle Application Server (OAS)
Our hope is that we can supply you with enough information so you’ll be able to recognize the terms and concepts pertaining to each of the products described. You can get a great deal more information from Oracle Corporation.
Trusted Oracle is a multi-level security (MLS) product used primarily within government agencies where data access is based on security clearance levels. The government security levels are (in increasing degree of security):
Normally, in highly secure government agencies, information is restricted by a “need to ...