Holistic Database Security


Razvoj & Middleware

Datum i vrijeme

petak, 18. listopad 2019., 10:20


Dvorana B



For years we have been locking down the software to protect information. This presentation puts the focus where it belongs: identifying, protecting, and selecting the correct tools to protect your data. Starting with a brief history of security breaches and the impact to both companies and consumers, the presenter will move through a methodology of identifying sensitive information, creating a risk matrix, and which tools are available to mitigate information leaks.Attack Vector: how does your information leak. Including an open and frank discussion of organized gangs (ie Anonymous)Risk identification and mitigation. Identify the risks in your system and come up with mitigation strategies.Audit. Identify what to audit based on your risks. Audit too much and you will get bogged down, too little audit and you may miss a breach of security.Database encryption. Encrypting the database, the tablespace, the tables or atomic data? What is the cost and how do you accomplish it. Network encryption.

What are the risks of man in the middle attack? How to setup network encryption.Backup encryption. What are the risks of losing a backup tape? How to encrypt backups using RMAN.Data redaction. Who gets to see sensitive data? Do you want to expose credit card numbers or other PII to users? Introduction on how to setup data redaction.

Detalji o predavanju

Vrsta: Predavanje
Razina težine: Općenito
Poželjno iskustvo slušatelja: Iskusni (2-3 g.)
Poželjna funkcija slušatelja: DBA , Programeri
Grupa aktivnosti: Razvoj & Middleware

O predavaču

Najbolji pokrovitelj

Bolji pokrovitelj

Edukacijski pokrovitelj

Medijski pokrovitelj


Konferenciju organizira Hrvatska udruga Oracle korisnika. Više o udruzi možete saznati na Hroug.hr.

Prati nas na Twitteru

Sve novosti i zanimljivosti vezane uz HrOUG 2018 objavljujemo na Twitteru!

Prati nas na Facebooku