what should an end user do to configure the security mechanisms of Oracle?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The end user should not do a thing to configure the security of an Oracle database. That should be entirely up to the Database Administrator. Let me ask it to you this way, what should the general public do to ensure the safety of my house? The answer is that I should be responsible for the safety of my house. If I left it to the general public, someone is going to do some damage or steal items from my house. Similarly, left unchecked by the DBA, the end user will probably end up doing damage or stealing data from the database.
It is one of the DBAs primary reponsibilities to ensure that the database is adequately secured. This is quite a topic ranging from stopping hacks, to encrypting data, to ensuring that only required individuals have access to and the ability to change data. The DBA should be well versed in all aspects of securing the database and the data inside.
For More Information
- What do you think about this answer? E-mail the editors at editor@searchDatabase.com with your feedback.
- The Best Oracle Web Links: tips, tutorials, scripts, and more.
- Have an Oracle or SQL tip to offer your fellow DBAs and developers? The best tips submitted will receive a cool prize. Submit your tip today!
- Ask your technical Oracle and SQL questions -- or help out your peers by answering them -- in our live discussion forums.
- Ask the Experts yourself: Our SQL, database design, Oracle, SQL Server, DB2, metadata, object-oriented and data warehousing gurus are waiting to answer your toughest questions.
Dig Deeper on Oracle database design and architecture
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.