Preview

Oracle Database 11 G

Better Essays
Open Document
Open Document
1761 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Oracle Database 11 G
Abstract

Oracle Database 11 g is a comprehensive platform database, there are many features of the Oracle product that support different kinds of companies worldwide. This writing assignment will present an overview of some Oracle features. More specifically this paper will focus on the main features of oracle database administration, like security, indexing constraints and views.

Basic user security

Security refers to activities and measures to ensure the confidentiality, integrity, and availability of an information system and its main asset, data. (Coronel, 2010). Database security consists of the mechanisms that protect the database against intentional or accidental threats. Security considerations apply not only to the data held in a database but security breaches can affect other parts of the system. Database security takes into consideration hardware, software, users and the data. To effectively implement security requires appropriate controls, which are defined in specific mission objective. This need for security, while often having been neglected or overlooked in the past , is now increasingly recognized by organizations. The reason for this turnaround is the increasing amounts of crucial corporate data being stored on computer and the acceptance that any loss or unavailability of this data could prove to be disastrous. . ( Connolly, 2005).
Oracle, like the rest of the computer industry, has provided a large sampling of security settings for the database. The basic levels of security break down to account, access, and system level security. To access a database, a user must run a database application and connect to the database instance using a valid user name defined in the database. For Oracle, the creation of a new user with password authentication must be set. Whenever the user attempts to connect to the database, this user will be presented with a Connect or Log On dialog box, prompting for a user name and password to access the



References: Casteel, J. (2009) Oracle 11g SQL. Connolly, T. & Begg, C. (2005). Database Systems: A Practical Approach to Design, Implementation, and Management. (4th ed.). Coronel, C., Morris, S. & Rob, P. (2010). Database Systems: Design, Implementation and Management (9th ed.). Murray, M. (2010). Database Security: What Students Need to Know. Journal of Information Technology Education: Innovations in Practice. Vol 9. Kuhn, D. (2010). Pro Oracle Database 11g Administration Oracle: Database Administrator 's Guide 11g Release 1 (11.1). (2008). Retrieved from http://docs.oracle.com/cd/B28359_01/server.111/b28310.pdf Oracle: Performance Tuning Guide 11g Release 1 (11.1). (2008). Retrieved from http://docs.oracle.com/cd/B28359_01/server.111/b28274.pdf Taylor, C. (2003). An Introduction to Metadata. Retrieved from http://www.library.uq.edu.au/iad/ctmeta4.html Stellato, E. (2012). The Benefits of Indexing Foreign Keys. Retrieved from http://www.sqlperformance.com/2012/11/t-sql-queries/benefits-indexing-foreign-keys

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    CMGT 400 Week 1 DQs

    • 676 Words
    • 3 Pages

    The project for CIS336 is designed to touch all aspects of the fundamental concepts of database design and logical data modeling covered during the class. The project is team centered and each team will be responsible for designing, developing, and demonstrating the functionality of a database created based on a defined set of business specifications. At the end of the session, each project team will submit the database designed by the team and demonstrate the database's ability to deliver the required information as outlined in the project specifications. All aspects of the project will be ...…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Rob, P., & Coronel, C. (2002). Database systems: design, implementation, and management (5th ed.). Boston, MA: Course Technology.…

    • 1383 Words
    • 5 Pages
    Best Essays
  • Good Essays

    Cis 515week 3

    • 1024 Words
    • 4 Pages

    Bibliography: (2012). Database systems: Design, implementation, and management. (10 ed.). United States of America: Joe Sabatino.…

    • 1024 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Dbm 381 Week 1 Individual

    • 971 Words
    • 4 Pages

    Pratt, P.J., & Adamski, J.J. (2012). Concepts of database management (7th ed.). Retrieved from The University of Phoenix eBook Collection database.…

    • 971 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Athabasca Assignment

    • 837 Words
    • 4 Pages

    Relational databases are not new technology. Commercially, they gained importance in the early 1980s with the introduction of Oracle’s relational database, and since then they have been an essential tool for most businesses. Databases are critical tools that help to support various business functions in an organization. These information systems help a business to build and maintain competitive advantage. Databases not only support the operational levels of business—they are also used to support the activities of managers.…

    • 837 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Pratt, P.J, & Adamski J.J, (2011). Concepts of Database Management. Ohio, OH: CENGAGE Learning.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Better Essays

    SQL vs. Oracle

    • 954 Words
    • 3 Pages

    McLaughlin, Michael (2011). Oracle Database 11g & MySQL 5.6 Developer Handbook. New York: McGraw-Hill, 2011. Print.…

    • 954 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Database Security: This section includes information about security issues with MySQL databases and Oracle databases.…

    • 1593 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Sql Essay

    • 641 Words
    • 3 Pages

    References: Rob, P., & Coronel, C. (2009). Database Systems Design, Implementation, and Management (8th ed.). Boston, MA: Thomson Course Technology.…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ^ a b c Schuster, Stewart A. (June 15, 1981). "In Depth: Relational Data Base Management". Computerworld. Retrieved November 16, 2012.…

    • 2930 Words
    • 12 Pages
    Powerful Essays

Related Topics