Securitatea bazelor de date Oracle

                                   CUPRINS
|I.       |Introducere      |                                        |pag. 2 |
|I.1.            |Scurta istorie a companiei     |                   |pag. 2 |
|                |Oracle                         |                   |       |
|         |                 |                                        |       |
|II.      |Generalitati     |                                        |pag. 5 |
|II.1.           |Sfaturi din partea expertilor privind              |       |
|                |securizarea D.B. Oracle |                          |pag. 5 |
|II.2.           |Managementul riscului D.B. |                       |pag. 6 |
|II.3.           |Aplicarea principiilor de securitate               |       |
|                |la bazele de date |                                |pag. 6 |
|         |                              |                           |       |
|III.     |Securitatea bazelor de date   |                           |pag. 8 |
|III.1.          |Securitatea conturilor|                            |pag. 8 |
|III.2.          |Privilegii legate de      |                        |pag. 8 |
|                |obiecte                   |                        |       |
|III.3.          |Rolurile si Privilegiile de la nivelul|            |pag. 9 |
|                |sistem                                |            |       |
|III.4.          |Implementarea securitatii |                        |pag. 9 |
|III.4.1.               |Punctul de pornire: securitatea  |          |pag. 9 |
|                       |S.O.                             |          |       |
|III.5.          |Crearea utilizatorilor|                            |pag. 10|
|III.6.          |Stergerea              |                           |pag. 11|
|                |utilizatorilor         |                           |       |
|III.7.          |Privilegii la nivelul     |                        |pag. 12|
|                |sistem                    |                        |       |
|III.8.          |Profilul          |                                |pag. 15|
|                |utilizator        |                                |       |
|III.9.          |Administrarea parolelor |                          |pag. 17|
|III.10.         |Prevenirea refolosirii        |                    |pag. 18|
|                |parolelor                     |                    |       |
|III.11.         |Configurarea complexitatii        |                |pag. 20|
|                |parolelor                         |                |       |
|III.12.         |Legarea conturilor D.B. de cele ale  |             |pag. 23|
|                |S.O.                                 |             |       |
|III.13.         |Protectia parolei  |                               |pag. 26|
|III.14.         |Privilegii la nivelul     |                        |pag. 27|
|                |obiect                    |                        |       |
|III.15.         |Privilegii de afisare|                             |pag. 31|
|         |                                    |                      |       |
|IV.      |Limitarea comenzilor disponibile    |                      |pag. 33|
|IV.1.           |Profilul user de produs|                           |pag. 33|
|IV.2.           |Securitatea parolei in timpul       |              |pag. 34|
|                |conectarii                          |              |       |
|IV.3.           |Criptarea parolelor  |                             |pag. 34|
|IV.3.1                 |Cum sunt salvate        |                   |pag. 34|
|                       |parolele                |                   |       |
|IV.3.2.                |Configurarea parolelor         |            |pag. 34|
|                       |imposibile                     |            |       |
|IV.3.3.                |Schimbarea user-ului|                       |pag. 36|
|         |      |      |                                            |       |
|V.       |Concluzii       |                                         |pag. 38|
|         |                                                          |       |
|         |                                                          |       |
|VI.      |Bibliografie|                                             |pag. 39|
|         |        |                                                  |       |
|VII.     |Anexa   |                                                  |pag. 40|
      Pagini 53
-----------------------
2