Sunday, October 24, 2010

Oracle :DATABASE SECURITY

DATABASE SECURITY
118. What are Roles ?
Roles are named groups of related privileges that are granted to users or other roles.
119. What are the use of Roles ?
REDUCED GRANTING OF PRIVILEGES - Rather than explicitly granting the same set of privileges to many users a database administrator can grant the privileges for a group of related users granted to a role and then grant only the role to each member of the group. DYNAMIC PRIVILEGE MANAGEMENT - When the privileges of a group must change, only the privileges of the role need to be modified. The security domains of all users granted the group's role automatically reflect the changes made to the role. SELECTIVE AVAILABILITY OF PRIVILEGES - The roles granted to a user can be selectively enable (available for use) or disabled (not available for use). This allows specific control of a user's privileges in any given situation.
APPLICATION AWARENESS - A database application can be designed to automatically enable and disable selective roles when a user attempts to use the application.
120. How to prevent unauthorized use of privileges granted to a Role ?
By creating a Role with a password.
121. What is default tablespace ?
The Tablespace to contain schema objects created without specifying a tablespace name.
122. What is Tablespace Quota ?
The collective amount of disk space available to the objects in a schema on a particular tablespace.
123. What is a profile ?
Each database user is assigned a Profile that specifies limitations on various system resources available to the user.
124. What are the system resources that can be controlled through Profile ?
The number of concurrent sessions the user can establish the CPU processing time available to the user's session the CPU processing time available to a single call to ORACLE made by a SQL statement the amount of logical I/O available to the user's session the amout of logical I/O available to a single call to ORACLE made by a SQL statement the allowed amount of idle time for the user's session the allowed amount of connect time for the user's session.
125. What is Auditing ?
Monitoring of user access to aid in the investigation of database use.
126. What are the different Levels of Auditing ?
Statement Auditing, Privilege Auditing and Object Auditing.
127. What is Statement Auditing ?
Statement auditing is the auditing of the powerful system privileges without regard to specifically named objects.
128. What is Privilege Auditing ?
Privilege auditing is the auditing of the use of powerful system privileges without regard to specifically named objects.
129. What is Object Auditing ?
Object auditing is the auditing of accesses to specific schema objects without regard to user.

0 comments:

Post a Comment