tailieunhanh - Applied Oracle Security: Developing Secure Database and Middleware Environments- P60

Applied Oracle Security: Developing Secure Database and Middleware Environments- P60:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 564 Part IV Applied Security for Oracle APEX and Oracle Business Intelligence shared connection pool. Once the database knows who is running the query it should be a simple matter of enabling database auditing. As you know caching exists to speed performance and it does this by eliminating redundant work. In our examples this means redundant queries. The consequence is that when the caching feature of Oracle BI is enabled it is possible that queries will sometimes be satisfied without even accessing the database. In such cases there is nothing to audit in the database because the database has done no work. This leaves three options. First realize the limitation and understand that database auditing will work only when queries are actually sent to the database. This is not a bad option however an audit record of the first query meaning the query that generated the cache entry will exist so it s not as if data can be viewed without your knowledge you simply won t know everyone who looked at it. Second turn off caching and force all queries to the database. This will ensure auditing for all access by all users all the time but negates any performance enhancements to the application as well as the benefits of allowing the database to do other work instead of returning these redundant queries. Third combine the auditing that the BI server does with the auditing that the database does. This option depicted in the following illustration is discussed in the next two sections. Auditing Bl server Usage Tracking The usage tracking feature of the Oracle BI enables you to capture information about your environment that can be used for a variety of purposes Tracking actual performance data Often performance data is conveyed through vague references to dashboards being slow. Usage tracking provides actual facts on how long queries take where the time is being spent database or BI server and cache hit information. Not only can this provide useful performance information but it can