Access control list for each file or
Access control in a database relates to a
defined user and their authorization scheme. In Oracle, it is
implemented using privileges and grants to individual users.
Careful analysis must establish what users should have access
to, what objects must be audited for accuracy, and what changes
should be tracked. In Chapter 4, we discussed general Oracle
security. In Chapter 10, we explained in detail how to verify
existing privileges and track them for auditing purposes.
Another type of access control is
machine-to-machine using the network. In Oracle, several methods
can be used to control access among machines – such as Valid
Node Checking, Connection Manager Node Checking, SSH
Redirections, etc. All these have been discussed in Chapter 7 –