- protocols in distributed DBMSs (security insurance)
- evaluation of the security degree in RDBMSs
I'm not a MS SQL expert, but for Oracle, I'd start looking at the Oracle Documentation. You can access all Oracle documentation at http://tahiti.oracle.com. You'll have to dig to get the information that you seek. For Oracle, most network transmission uses TCP/IP protocols. Since this in unsecure, Oracle will let you use Kerberos and other encryption routines.
As for security in the database...Oracle has the ability to encrypt data in the database. One can also limit access to data using standard RDBMS security tools as well as Fine Grained Access Control (FGAC), sometimes called a Virtual Private Database (VPD).
And there is much, much more! You can get this information from the documentation. It will take some time and you will have to wade through a lot of stuff. But you will eventually find what you are looking for. You may wish to start with the Oracle 9i Security Guide, found on the 'tahiti' URL given above.
For More Information
- Dozens more answers to tough Oracle questions from Brian Peasland are available.
- The Best Oracle Web Links: tips, tutorials, scripts, and more.
- Have an Oracle or SQL tip to offer your fellow DBAs and developers? The best tips submitted will receive a cool prize. Submit your tip today!
- Ask your technical Oracle and SQL questions -- or help out your peers by answering them -- in our live discussion forums.
- Ask the Experts yourself: Our SQL, database design, Oracle, SQL Server, DB2, metadata, object-oriented and data warehousing gurus are waiting to answer your toughest questions.
This was first published in June 2002