Databases Reference
In-Depth Information
Security Management
Oracle provides several tools to protect your data against unauthorized access.
Encrypted backups, encrypted data pump exports, certified security, and user
authentication are just some of the useful tools and techniques that can be used
to enhance security management. The keystone tool used to manage security is
the Oracle Wallet Manager, a tool which was explained earlier in this topic.
Backups are a must do task wherever an information system exists. Backing up
information is a task that should be routinely performed. The point here doesn't
actually have to do with backups by themselves, but how to manage those backups
once they are taken. A backup holds the information required to restore the system.
It allows you to restore it somewhere else, but to the original system where it was
taken from. If this is not an authorized location, or if the user is not supposed to be
authorized to restore the data, then the data's security could be compromised. Oracle
provides mechanisms based on the Oracle Wallet to protect sensitive data, not only
data stored inside the database, but also data stored on backup media.
Using the Oracle Wallet to encrypt
backups
Backups are a mandatory condition for all enterprises. They are required to ensure
data recovery is possible in case of systems failure. However, it is important not only
to have a valid backup, but also to manage the backup correctly. A backup, once
taken, is stored at some place. What would happen if a user has access to the physical
backup media, and this user performs an unauthorized backup test? The good news
is that the backup is being tested; the bad news is that we will never know the result,
not to mention that the enterprise data confidentiality will be compromised.
Search WWH ::




Custom Search