Disclaimer - Alliance Digital Repository
Disclaimer - Alliance Digital Repository
Disclaimer - Alliance Digital Repository
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
23<br />
making sure their servers, especially those exposed to the Internet, are properly patched<br />
(Westman, 2002; Alapati, 2003, sec. 1, par. 27).<br />
Given that many businesses use databases for the storage of critical information,<br />
and new requirements of both laws and governments require increased security of this<br />
data, it is important to take the necessary actions to ensure security (Fernandez-Medina &<br />
Piattini, 2005). Beynon-Davies (2004) suggests that the primary way of securing<br />
database systems is by defining a set of authorized users of the entire system, or more<br />
commonly, parts of the database. In order to prevent hacking attempts on default user<br />
accounts of the RDBMS, Oracle Corporation recommends that all default user accounts<br />
are locked and expired, with the exception of the SYS and SYSTEM account (Alapati,<br />
2003, sec. 1, par. 3). Alapati (2003, sec. 1, pars. 4, 5, 7, 27) also suggests the following<br />
to secure a database:<br />
• Do not hard-code user passwords in scripts, but rather use a password file.<br />
• Force users to change passwords in a timely fashion.<br />
• Perform frequent checks of the audit trail for signs of logins as SYSDBA and<br />
unsuccessful attempts to log in to the database.<br />
• Keep current on new security vulnerabilities and patch accordingly.<br />
While securing the perimeter of a network with a firewall will protect the database<br />
from external threats, using these suggestions is a good step in protecting the database<br />
from risks from the network inside the firewall (Alapati, 2003, sec. 1, par. 1, 22).