Database Security Requirements : Computer Systems Controlled Access Requirements Essay

1599 Words7 Pages
4. DATABASE SECURITY REQUIREMENTS
4.1. ORACLE SECURITY
Just like the computer systems controlled access requirements, authentication on the Oracle level is also required were a user must enter a distinct ID and password.
According to Mehta (2004), “user authentication at the Oracle level can be configured through creating custom profile(s) within the dba_profiles table. A profile within Oracle is a set of controls that can be applied to users. Different profiles can be created for different classes of accounts” (p.41).
In addition to authentication, authorization is also an important aspect of Oracle security. Without the proper granting of privileges to a user, a user won’t be able to do anything. The key privileges for users are:
• SELECT – This privilege gives the user the ability to select and view data from specified database tables (Harter, 2008, p.2).

• UPDATE – This privilege gives the user the ability to modify data values in specified database tables (Harter, 2008, p.2).

• DELETE – This privilege gives the user the ability to delete rows/records from specified database tables (Harter, 2008, p.2).

• INSERT- This privilege gives the user the ability to add new rows/records into specified database tables (Harter, 2008, p.2).

These privileges are granted through the Database Administrator (DBA) that provides access using Oracle data definition language (DDL) commands (Harter, 2008).
4.2. BANNER SECURITY
Oracle Forms are a toolset that is used to create the
Get Access