19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

Example:<br />

In an Oracle database, every table is assigned a fixed number of extents. In<br />

Oracle terminology, Extent designates a logical unit of magnitude. <strong>The</strong> data of<br />

a table are stored in at least one extent. Once the capacity of an extent has<br />

been exhausted, the database management system automatically creates<br />

another extent. <strong>The</strong> following values can be defined during the creation of a<br />

table:<br />

- Size of the first extent in bytes<br />

- Size of the second extent in bytes<br />

- Percentage growth of all additional extents, relative to the size of the<br />

second extent<br />

- Maximum number of extents which can be created for a table<br />

- <strong>The</strong> PCTFREE parameter is used to reserve any required percentage of the<br />

new blocks for later modifications.<br />

Regular checks must also be made as to whether the data volume is actually<br />

increasing at the originally assumed rate. If it increases more slowly, memory<br />

resources which could be used for other purposes are tied down unnecessarily.<br />

If it increases more quickly, bottlenecks in the memory capacity might occur.<br />

Furthermore, the degree of utilisation of the database must be checked<br />

regularly, particularly as regards the set upper limits (refer to S 4.73<br />

Specifying upper limits for selectable data records).<br />

<strong>The</strong> information of relevance to the actual monitoring of a database depends<br />

on its mode of operation, i.e. the standard database software in use.<br />

Accordingly, individual measures must also be implemented to so modify the<br />

database configuration that it meets requirements concerning access speeds,<br />

intended transactions etc.<br />

Scripts can be used to automate monitoring of the database. However, a<br />

prerequisite here is that the database software supplies the information in a<br />

form which can be analysed automatically.<br />

Additional controls:<br />

- Are database files, important tables and the utilisation of the database<br />

checked regularly?<br />

- Have appropriate monitoring intervals been defined?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!