Call for Oracle support & training (800) 766-1884
Free Oracle Tips

Home
Corporate Oracle Training
Custom Oracle Training
Oracle New Features Training
Advanced Oracle DBA Classes
Oracle Tuning Courses
Oracle Tips & Tricks
Oracle Training Links
Oracle Training Links
Oracle Training Links

We are top for USA Oracle Training Clients

 

Free Oracle Tips


 
HTML Text AOL

Free Oracle App Server Tips


 
HTML Text

Oracle support

Oracle training

Oracle tuning

Rednecks!

Remote Oracle

Custom Oracle Training

 

   
  Oracle Tips by Burleson

Chapter 3 Introducti

on to Oracle Auditing

them in a register, or by using an automated entry system using keypad access, or by a security camera recording all personnel entering and leaving the room, or perhaps a combination of all of these.

In Oracle, recording object accesses is known as object auditing. For example, if the user accesses the table named claims, the fact is recorded in the audit trail, along with several other useful pieces of information, like the timestamp of access, IP address of the user's machine, the exact privileges used to access the table, the nature of the access (did the user delete some data, insert some records, update some fields, or simply select some rows), and many others. From this audit trail, a detailed track of the user's activity can be reconstructed. It is different from user auditing, where the fact that the user simply accessed the database is recorded, not the objects he or she accessed.

HIPAA regulations require that object access auditing be enabled and monitored. However, common sense shows that the auditing is not going to be useful for all of the objects, only a few key tables must be audited for unauthorized access. The definition of key tables depends on the data they contain and whether or not the data is sensitive. For instance, the table containing the Protected Health Information (PHI) data such as claims, member, billing information, etc., may be specifically audited.

Auditing can be done on a variety of statements that the user can issue.  For instance, the auditing setup can require that a user give a statement to select from a particular table or view, or to execute a particular stored
 

The above text is an excerpt from:

Oracle Privacy Security Auditing

The Final Word on Oracle Security

 

This is the only authoritative book on Oracle Security, Oracle Privacy, and Oracle Auditing written by two of the world’s leading Oracle Security experts.

This indispensable book is only

$39.95

 and has an immediate download of working security scripts:

 

http://rampant-books.com/book_2003_2_audit.htm



 
 
 
 

Oracle performance tuning book

 

 

Oracle performance tuning software

 
Oracle performance tuning software
 
Oracle performance Tuning 10g reference poster
 
Oracle training in Linux commands
 
Oracle training Excel
 
 
 
 

 

email BC:


Copyright © 1996 -  2014 by Burleson Inc. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation.