01.09.2016 Views

Beginning Oracle Database 11g Administration From Novice to Professional

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 10 MONITORING 205<br />

Listing 10-4. Moni<strong>to</strong>ring the His<strong>to</strong>ry of Modifications <strong>to</strong> Tables and Other Objects<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

I will have more <strong>to</strong> say on the subject of auditing in Chapter 14 and, in particular, on<br />

the location and sizing of the audit trail.<br />

Moni<strong>to</strong>ring Security<br />

The database administra<strong>to</strong>r can use the <strong>Oracle</strong> auditing facilities <strong>to</strong> moni<strong>to</strong>r database<br />

usage. The command causes all connections and disconnections<br />

<strong>to</strong> be recorded. Of particular interest for security purposes are the , ,<br />

and values in the view. These tell us where a connection<br />

originated; unusual values might indicate unauthorized intrusions. For example,<br />

when I checked the database on my lap<strong>to</strong>p, I found what appeared <strong>to</strong> be connections that<br />

originated from another computer called 13. This alarmed me and I checked<br />

the and values in ; fortunately, they predated the<br />

creation of the database, which meant that the mysterious audit records were in the database<br />

template used by <strong>Database</strong> Configuration Assistant (DBCA) when the database was<br />

created. The results of my investigation can be seen in Listing 10-5.<br />

Listing 10-5. Moni<strong>to</strong>ring the His<strong>to</strong>ry of Connections and Disconnections

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!