Why Oracle 12c Has Introduced Two New Roles – AUDIT_ADMIN And AUDIT_VIEWER.

3/12/2019 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=043902cf-f693-4caf-93d5-0ab98b9f46b9&course_id… 1/3

%50

%19

%2

SafeAssign Originality Report Database Security – 201930 – CRN160 – Thota • Week 8 Paper

%71Total Score: High riskPratibha Sugureddygari Submission UUID: b0b91467-9346-6662-c8c8-6d32b50133c4

Total Number of Reports

1 Highest Match

71 % Submission_Text.html

Average Match

71 % Submitted on

03/10/19 10:12 PM EDT

Average Word Count

670 Highest: Submission_Text.html

%71Attachment 1

Institutional database (6)

Student paperStudent paper Student paperStudent paper Student paperStudent paper

Student paperStudent paper Student paperStudent paper Student paperStudent paper

Internet (4)

oracle-baseoracle-base ugentugent oracleoracle

oracleoracle

Global database (1)

Student paperStudent paper

Top sources (3)

Excluded sources (0)

View Originality Report – Old Design

Word Count: 670 Submission_Text.html

33 11 22

44 1010 88

99 1111 77

55

66

33 Student paperStudent paper 11 Student paperStudent paper 99 oracle-baseoracle-base

 

 

3/12/2019 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=043902cf-f693-4caf-93d5-0ab98b9f46b9&course_id… 2/3

Source Matches (19)

Student paper 100%

Student paper 65%

Student paper 71%

Student paper 62%

AUDIT_ADMIN and AUDIT_VIEWER

To start with, auditing is the monitoring and recording of configured database actions form both the users of the database as well as the database non-users.

The actions of the database users are known through database auditing. Database administrators set up the auditing for the sake of security purposes so that

users are not able to access information without permission. Therefore, database auditing helps in keeping a check on the actions of the database of the users.

The users who are accepted in the through the client _identifier attribute in the database are referred to as the non-database users. Auditing this type of users

unified audit policy condition or Oracle database real application security is used.

There are many advantages associated with auditing. Firstly, Auditing is important in that it allows accountability for actions such as actions taken on the schema,

table, or row which affects specific content (Groomer, & Murthy, 2018). Secondly, it helps in deterring intruders or users from inappropriate actions based on

their accountability. Thirdly, auditing notifies auditors of actions of an authorized user for instance when an intruder changes or deletes any file or if an operator has extra rights than anticipated. Lastly, auditing helps in data monitoring and data gathering concerning a particular event in the database such the tables updating, the logical I/Os being completed or the simultaneous operators who can link in the at the pick times.

It is possible to configure the audit for both successful and failed activities as well as including or excluding specific users from the audit. Apart from auditing the

standard activities provided by the database, auditing can also initially; users were allowed adding and removing audit configuration to objects in their own schemas without any additional privileges. However with the introduction of two new roles by oracle 12c which are AUDIT_ ADMIN and AUDIT_ VIEWER the case is totally

different. The two new roles facilitate responsibilities separation in the process of auditing. In audit configuration, it is not necessary having the dba role or connecting as sysdba. In the side of security, this is a very big improvement.

AUDIT_ADMIN is used by the administrators in configuring, auditing and administration of both unified audit policies and fine-grained policies and this role also

helps in viewing and analyzing audit data, which is the primary role of the security administrator (Ravikumar, Krishnakumar, & Basha, 2017). In order for an

auditor to perform any kind of auditing, they must be granted the audit admin_ role. Having an AUDIT_ADMIN, creating, altering, enabling, disabling and dropping audit policies, viewing audit data, as well as managing the trail of unified audit becomes easier for auditors. AUDIT_VIEWER, on the other hand, is used by the

auditors in viewing and analyzing audit data only. This role is typically granted to the external auditors, and the auditors can only view audit data after being granted the AUDIT_VIEWER role. It provides the executive privilege on the package of DBMS_AUDIT_UTIL PL/SQL.

The provision of these two new roles is helpful in that it provides an audit performance which is much faster as compared to the previous releases of the Oracle database. It has easier controlling how the audit records are written on the audit trail. The audit data can be written immediately or it can also be queued in the memory. The introduction of audit policies and the unified audit trail has helped in simplifying the configuration of database auditing in Oracle 12c. The auditing

of the database has always been extremely flexible; however, this flexibility has always made feel complicated.

References

Groomer, S. M., & Murthy, U. S. (2018). Continuous auditing of database applications: An embedded audit module approach. In Continuous Auditing: Theory

and Application (pp. 105-124). Emerald Publishing Limited.

http://www.dba86.com/docs/oracle/12.2/DBSEG/introduction-to-auditing.htm

Ravikumar, Y. V., Krishnakumar, K. M., & Basha, N. (2017). Oracle Database Upgrade and Migration Methods: Including Oracle 12c Release 2. Apress.

11

22

33

44

55

66

77

22

33

33

88

44

99

11 11

11

1010

1111 1111

1

Student paper

AUDIT_ADMIN and AUDIT_VIEWER

Original source

audit-admin and audit-viewer

2

Student paper

To start with, auditing is the monitoring and recording of configured database actions form both the users of the database as well as the database non- users.

Original source

Auditing involves monitoring as well as recording on all configured databases actions from databases users and non- users

3

Student paper

The actions of the database users are known through database auditing. Database administrators set up the auditing for the sake of security purposes so that users are not able to access information without permission. Therefore, database auditing helps in keeping a check on the actions of the database of the users.

Original source

Database auditing is required to keep a check on the database actions of the users For security purposes, database administrators set up the auditing for example cases where without the permission to access information the users should be able to not access it Database auditing is required to keep a check on the database actions of the users

4

Student paper

The users who are accepted in the through the client _identifier attribute in the database are referred to as the non- database users.

Original source

Non database users are recognized by the database by using the attribute called CLIENT_IDENTIFIER and also it refers only to the application users

 

 

3/12/2019 Originality Report

https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=043902cf-f693-4caf-93d5-0ab98b9f46b9&course_id… 3/3

oracle 68%

Student paper 64%

oracle 71%

Student paper 72%

Student paper 65%

Student paper 66%

Student paper 72%

Student paper 63%

oracle-base 75%

Student paper 100%

Student paper 100%

Student paper 100%

Student paper 100%

ugent 100%

ugent 100%

5

Student paper

Auditing this type of users unified audit policy condition or Oracle database real application security is used.

Original source

Configuring a Unified Audit Policy for Oracle Database Real Application Security

6

Student paper

There are many advantages associated with auditing.

Original source

There are many advantages that are associated with computer audit software

7

Student paper

Secondly, it helps in deterring intruders or users from inappropriate actions based on their accountability.

Original source

Deter users (or others, such as intruders) from inappropriate actions based on their accountability

2

Student paper

It is possible to configure the audit for both successful and failed activities as well as including or excluding specific users from the audit.

Original source

The audit can be configured for both failed and successful activities, as well as including or excluding particular users from the process

3

Student paper

However with the introduction of two new roles by oracle 12c which are AUDIT_ ADMIN and AUDIT_ VIEWER the case is totally different.

Original source

Oracle 12c has introduced two new roles – AUDIT_ADMIN and AUDIT_VIEWER for unified auditing

3

Student paper

AUDIT_ADMIN is used by the administrators in configuring, auditing and administration of both unified audit policies and fine-grained policies and this role also helps in viewing and analyzing audit data, which is the primary role of the security administrator (Ravikumar, Krishnakumar, & Basha, 2017).

Original source

AUDIT_ADMIN is the role which enables the administrator to configure auditing and administer both unified audit policies and fine-grained audit policies and view and analyze audit data, which is the role of a security administrator

8

Student paper

In order for an auditor to perform any kind of auditing, they must be granted the audit admin_ role.

Original source

To perform any kind of audits you must be granted the Audit_Admin Role

4

Student paper

AUDIT_VIEWER, on the other hand, is used by the auditors in viewing and analyzing audit data only.

Original source

And another AUDIT_VIEWER used for viewing and analyzing the data in auditing

9

Student paper

The introduction of audit policies and the unified audit trail has helped in simplifying the configuration of database auditing in Oracle 12c. The auditing of the database has always been extremely flexible;

Original source

The introduction of audit policies and the unified audit trail simplifies the configuration of database auditing in Oracle 12c Database auditing has always been extremely flexible, but that flexibility has also served to make it feel complicated

1

Student paper

M., & Murthy, U.

Original source

M., & Murthy, U

1

Student paper

Continuous auditing of database applications: An embedded audit module approach. In Continuous Auditing: Theory and Application (pp.

Original source

Continuous auditing of database applications An embedded audit module approach In Continuous Auditing Theory and Application (pp

1

Student paper

Emerald Publishing Limited.

Original source

Emerald Publishing Limited

10

Student paper

http://www.dba86.com/docs/oracle/12.2/ DBSEG/introduction-to-auditing.htm

Original source

http://www.dba86.com/docs/oracle/12.2/ DBSEG/introduction-to-auditing.htm

11

Student paper

V., Krishnakumar, K. M., & Basha, N.

Original source

V, Krishnakumar, K M, & Basha, N

11

Student paper

Oracle Database Upgrade and Migration Methods: Including Oracle 12c Release 2.

Original source

Oracle Database Upgrade and Migration Methods Including Oracle 12c Release 2

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!