||Oracle Tips by Burleson
Chapter 1 Introduction to HIPAA
Oracle for Database Administrators, Architects,
Developers, Managers, Security Managers, and general users of Oracle
databases around the world.
The book has been organized according to the
requirements placed by the law. The law mandates that organizations
evaluate and certify their security plans on the dimensions listed
below. The book also follows these dimensions in its narration and
The topic of Availability falls under a
separate domain for backup, recovery, and high availability, and
therefore is beyond the scope of the book. The other parts have been
arranged in various sections as follows.
The first act is Authentication, which deals
with the task of making sure that the user asking to interact with
the database is indeed legitimate, and not someone else masquerading
as a legitimate user. Essentially, it asks the incoming user
connection, "who are you and what proves that you are who you say
Next comes Authorization, which deals with the
task of making sure the user asking for a piece of information is
allowed to see or change it. If the user wants to see a record of
the claim table, this step ensures that the user is authorized to
see that information.
The above text is
an excerpt from:
Oracle Privacy Security Auditing
Final Word on Oracle Security
This is the only authoritative
book on Oracle Security, Oracle Privacy, and Oracle Auditing written
by two of the world’s leading Oracle Security experts.
This indispensable book is only $39.95 and has an
immediate download of working security scripts:
||Need an Oracle Health Check?
Does your boss blame you for an Oracle performance problem?
Need to prove that your database is properly optimized?
BC Oracle performance guru's can quickly verify every aspect of your
Oracle database and provide a complete certification that your database
is fully optimized.