Muutke küpsiste eelistusi

Oracle Incident Response and Forensics: Preparing for and Responding to Data Breaches 1st ed. [Pehme köide]

  • Formaat: Paperback / softback, 199 pages, kõrgus x laius: 235x155 mm, kaal: 3401 g, 17 Illustrations, color, 1 Paperback / softback
  • Ilmumisaeg: 29-Nov-2017
  • Kirjastus: APress
  • ISBN-10: 1484232631
  • ISBN-13: 9781484232637
Teised raamatud teemal:
  • Pehme köide
  • Hind: 28,48 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 33,51 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 199 pages, kõrgus x laius: 235x155 mm, kaal: 3401 g, 17 Illustrations, color, 1 Paperback / softback
  • Ilmumisaeg: 29-Nov-2017
  • Kirjastus: APress
  • ISBN-10: 1484232631
  • ISBN-13: 9781484232637
Teised raamatud teemal:
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done.

This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used to investigate a database breach. You will learn the measures to put in place now to make it harder for an attack to be successful, and to aid in the detection and investigation of future attacks. You will know how to bring together tools and methods to create a holistic approach and investigation when an event occurs, helping you to be confident of your ability to react correctly and responsibly to threats against your organization’s data.

What You'll Learn
  • Detect when breaches have or may have occurred
  • React with confidence using an organized plan
  • Determine whether a suspected breach is real
  • Determine the scope of data that has been compromised
  • Preserve evidence for possible criminal prosecutions
  • Put in place measures to aid future investigations
Who This Book is For

Database administrators, system administrators, and other technology professionals who may be called upon to investigate breaches of security involving Oracle Database

About the Author vii
Acknowledgments ix
Introduction xi
Chapter 1 Data Breach
1(26)
Types of Attack
2(6)
An Unskilled Breach
7(1)
A Skilled Breach
7(1)
What Is an Incident?
8(1)
What Is Incident Response?
9(1)
What Is Forensic Analysis?
10(1)
Chain of Custody
10(9)
What Is Oracle Database Forensics?
19(1)
How Does Oracle Function and Store Data?
20(4)
Oracle 12c Multitenant
24(3)
Chapter 2 Artifacts
27(66)
Heisenberg's Uncertainty Principle of Oracle
28(1)
Audit Trail or No Audit Trail?
29(1)
The Problem of Detecting READ
30(1)
Identity and Accountability
31(1)
Time
32(2)
Database Artifacts
34(26)
Tables or Views with SQL
34(7)
Tables or Views with Bind Data
41(1)
Tables or Views with Timestamps
42(2)
Privilege Changes
44(1)
Changes to Security
45(1)
Object Changes
46(2)
Redo Based
48(1)
ID Based Searches
49(2)
Applications Data
51(1)
Internals
52(3)
Flashback and Recycle
55(1)
Database Audit
56(2)
Database Dumps
58(2)
Rounding Up
60(1)
Non-Database Artifacts
60(13)
Webserver Logs
60(3)
Application Logs
63(1)
Operating System Audit
63(1)
TNS Listener Logs
64(2)
SQL*Net Trace
66(1)
SYSDBA Audit Trace Files and Logs
66(3)
Database Trace
69(2)
Database Datafiles
71(2)
Rounding Up
73(1)
Correlation
73(2)
Deleted Data
75(9)
Tuning Tools
84(3)
Rootkits
87(6)
Chapter 3 Incident Response Approach
93(26)
Planning
94(1)
Create an Incident Response Approach
95(24)
Incident Coordinator
96(2)
Create an Incident Response Team
98(3)
Create an Incident Response Process
101(12)
Create and Collate a Toolkit
113(6)
Chapter 4 Reacting to an incident
119(36)
A Sample Attack
120(1)
What Not To Do
121(1)
Incident Verification and Identification
122(5)
Collecting Artifacts
127(1)
Disconnecting the System or Shutting Down
128(1)
Connecting to the System
128(3)
Live Response and Artifact Collection
131(24)
Views, Base Tables, RAC, and Synonyms?
132(5)
Spreadsheets
137(1)
Server and Database State
137(1)
Get Server Details
137(4)
Web Server logs
141(1)
Collect Oracle Logs Files from the Server
141(4)
Get Last SQL
145(1)
Volatile Artifacts
146(1)
Database Artifacts
147(6)
Checksums
153(2)
Chapter 5 Forensic Analysis
155(22)
Pre-Analysis
156(1)
Example Analysis
156(16)
Post-Analysis
172(1)
How Did He Get In?
172(1)
What Rights Did He Have?
172(1)
What Did He See?
172(1)
What Did He Change?
173(1)
What Could He Have Done?
173(1)
Findings
173(1)
Report and Summary
174(1)
Restore and Rebuild
174(3)
Chapter 6 What To Do Next?
177(20)
Planning
177(4)
Thinking About Database Security
181(6)
Enabling Sophisticated Audit Trails
187(5)
Conclusions
192(2)
Further Reading
194(3)
Index 197
Pete Finnigan is the founder and CEO of PeteFinnigan.com Limited, a company based in York, UK that specializes in helping customers secure data held in their Oracle databases. He has assisted customers all over the world in performing security audits of their Oracle databases. He also has assisted clients with Oracle incident response and forensics, and design and implementation work on Oracle features such as Virtual Private Database (VPD), encryption, masking, and many more services. Pete also provides very popular detailed training on many aspects of Oracle Security. He has spoken many times at conferences around the world on the subject of Oracle security. Pete is an Oracle ACE for security and also a member of The OAKTable network of Oracle scientists. He graduated from university in Leeds, UK with an honors degree in electronics and electrical systems.

Pete authored the books SANS Oracle Step-byStep Guide version 1 and version 2 and also co-authored the book Expert Oracle Practices. He can be found on Linked In, Facebook, Twitter, and his company's website.