Call for Oracle support & training (800) 766-1884
Free Oracle Tips

Home
Corporate Oracle Training
Custom Oracle Training
Oracle New Features Training
Advanced Oracle DBA Classes
Oracle Tuning Courses
Oracle Tips & Tricks
Oracle Training Links
Oracle Training Links
Oracle Training Links

We are top for USA Oracle Training Clients

 

Free Oracle Tips


 
HTML Text AOL

Free Oracle App Server Tips


 
HTML Text

Oracle support

Oracle training

Oracle tuning

Rednecks!

Remote Oracle

Custom Oracle Training

 

   
  Oracle Tips by Burleson

Chapter 3 Introducti

on to Oracle Auditing

In this chapter, we will discuss some of the challenges of HIPAA auditing requirements, auditing options available in Oracle, and how to handle the requirements with what is available. As in the previous chapter, this chapter is written for all types of readers, whether or not they are familiar with Oracle. If you are looking for a specific auditing tool or option, please go to the respective chapter directly. Otherwise, you may want to browse this chapter to connect the HIPAA requirements with the auditing options.

User Logon Auditing

In the museum theft case, the first act of the investigators is to get the day's visitor records and employee attendance records. Although visitors are not allowed to enter the room, the investigators suspect that the perpetrator(s) might have had a visitor as an accomplice.

In a database, the first thing to check is who entered and when, regardless of the reason. Oracle provides several auditing options to record the fact that a user accessed the database, along with the information on the IP Address of the machine where the connection came from, time of access, the actions performed by the user, the timestamp when the user logged off, the amount of activity the user performed as indicated by number of database blocks read from and written to the database, etc. As you can see, the information captured is venerable and presents a complete picture of the user's activity in the session.

Another important aspect of auditing is recording who was not granted access, not just who did come in, depending on the privilege setting. This could be due to
 

The above text is an excerpt from:

Oracle Privacy Security Auditing

The Final Word on Oracle Security

 

This is the only authoritative book on Oracle Security, Oracle Privacy, and Oracle Auditing written by two of the world’s leading Oracle Security experts.

This indispensable book is only

$39.95

 and has an immediate download of working security scripts:

 

http://rampant-books.com/book_2003_2_audit.htm



 
 
 
 

Oracle performance tuning book

 

 

Oracle performance tuning software

 
Oracle performance tuning software
 
Oracle performance Tuning 10g reference poster
 
Oracle training in Linux commands
 
Oracle training Excel
 
 
 
 

 

email BC:


Copyright © 1996 -  2014 by Burleson Inc. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation.