相關主題
商品描述
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done.
This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used to investigate a database breach. You will learn the measures to put in place now to make it harder for an attack to be successful, and to aid in the detection and investigation of future attacks. You will know how to bring together tools and methods to create a holistic approach and investigation when an event occurs, helping you to be confident of your ability to react correctly and responsibly to threats against your organization’s data.
What You'll Learn
- Detect when breaches have or may have occurred
- React with confidence using an organized plan
- Determine whether a suspected breach is real
- Determine the scope of data that has been compromised
- Preserve evidence for possible criminal prosecutions
- Put in place measures to aid future investigations
Who This Book is For
Database administrators, system administrators, and other technology professionals who may be called upon to investigate breaches of security involving Oracle Database
商品描述(中文翻譯)
當你得知或懷疑 Oracle Database 環境遭受入侵時,請採取正確的步驟。本書將教授你辨識攻擊者如何入侵、他們看到了哪些資料以及可能進行了哪些其他行動的技巧。
本書將幫助你了解 Oracle Database 相關的鑑識學,以及調查資料庫入侵所需使用的工具和技術。你將學習現在應該採取的措施,以增加攻擊的成功難度,並協助偵測和調查未來的攻擊。當事件發生時,你將知道如何結合工具和方法,創建一個整體的方法和調查,幫助你對組織資料的威脅做出正確和負責任的反應,並對此充滿信心。
你將學習以下內容:
- 檢測是否發生了入侵或可能發生入侵
- 使用有組織的計劃自信地做出反應
- 確定懷疑的入侵是否為真
- 確定已經受到侵害的資料範圍
- 保留證據以供可能的刑事起訴
- 採取措施協助未來的調查
本書適合以下讀者:
- 資料庫管理員、系統管理員和其他可能需要調查涉及 Oracle Database 安全入侵的技術專業人員。