Đang chuẩn bị liên kết để tải về tài liệu:
Lecture Database security and auditing - Protecting data integrity and accessibility - Chapter 8: Application Data Auditing

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Lecture Database security and auditing - Protecting data integrity and accessibility - Chapter 8: Application Data Auditing presentation of content Create and implement Oracle triggers, create and implement SQL Server triggers, define and implement Oracle fine-grained auditing,. . | Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 8 Application Data Auditing Database Security and Auditing 2 Objectives Understand the difference between the auditing architecture of DML Action Auditing Architecture and DML changes Create and implement Oracle triggers Create and implement SQL Server triggers Define and implement Oracle fine-grained auditing Database Security and Auditing 3 Objectives (continued) Create a DML statement audit trail for Oracle and SQL Server Generate a data manipulation history Implement a DML statement auditing using a repository Database Security and Auditing 4 Objectives (continued) Understand the importance and the implementation of application errors auditing in Oracle Implement Oracle PL/SQL procedure authorization Database Security and Auditing 5 DML Action Auditing Architecture Data Manipulation Language (DML): companies use auditing architecture for DML changes DML changes can be performed on two levels: Row level Column level Fine-grained auditing (FGA) Database Security and Auditing 6 DML Action Auditing Architecture (continued) Database Security and Auditing 7 DML Action Auditing Architecture (continued) Database Security and Auditing 8 Oracle Triggers Stored PL/SQL procedure executed whenever: DML operation occurs Specific database event occurs Six DML events (trigger timings): INSERT, UPDATE, and DELETE Purposes: Audits, controlling invalid data Implementing business rules, generating values Database Security and Auditing 9 Oracle Triggers (continued) Database Security and Auditing 10 Oracle Triggers (continued) CREATE TRIGGER Executed in a specific order: STATEMENT LEVEL triggers before COLUMN LEVEL triggers BEFORE triggers before AFTER triggers USER_TRIGGERS data dictionary view: all triggers created on a table A table can have unlimited triggers: do not overuse them Database Security and Auditing 11 Oracle Triggers (continued) Database Security and Auditing 12 SQL Server Triggers . | Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 8 Application Data Auditing Database Security and Auditing 2 Objectives Understand the difference between the auditing architecture of DML Action Auditing Architecture and DML changes Create and implement Oracle triggers Create and implement SQL Server triggers Define and implement Oracle fine-grained auditing Database Security and Auditing 3 Objectives (continued) Create a DML statement audit trail for Oracle and SQL Server Generate a data manipulation history Implement a DML statement auditing using a repository Database Security and Auditing 4 Objectives (continued) Understand the importance and the implementation of application errors auditing in Oracle Implement Oracle PL/SQL procedure authorization Database Security and Auditing 5 DML Action Auditing Architecture Data Manipulation Language (DML): companies use auditing architecture for DML changes DML changes can be performed on two levels: Row .