Oracle incident response and forensics preparing for and responding to data breaches

Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. This book helps you understand forensics in relation to Oracle Database, and the...

Full description

Saved in:
Bibliographic Details
Main Author: Finnigan, Pete (Author)
Format: Book
Language:English
Published: Berkeley, CA Apress Imprint: Apress 2018
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 95008
003 MY-KLNDU
005 20241220004241.0
008 230513 2018 xxua b 001 0 eng d
020 |a 9781484232637 (pbk) 
020 |a 9781484232644 (ebk) 
039 9 |a 202402211627  |b rafizah  |y 202305130943  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a QA 76.9.D3 
090 |a QA 76.9.D3  |b F56 2018 
100 1 |a Finnigan, Pete  |e author 
245 1 0 |a Oracle incident response and forensics  |b preparing for and responding to data breaches  |c by Pete Finnigan 
264 1 |a Berkeley, CA  |b Apress  |b Imprint: Apress  |c 2018 
264 4 |c © 2018 
300 |a xvi, 199 pages  |b illustrations  |c 23 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
520 |a Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used to investigate a database breach. You will learn the measures to put in place now to make it harder for an attack to be successful, and to aid in the detection and investigation of future attacks. You will know how to bring together tools and methods to create a holistic approach and investigation when an event occurs, helping you to be confident of your ability to react correctly and responsibly to threats against your organization's data. What You'll Learn: Detect when breaches have or may have occurred React with confidence using an organized plan Determine whether a suspected breach is real Determine the scope of data that has been compromised Preserve evidence for possible criminal prosecutions Put in place measures to aid future investigations. 
592 |a 42470  |b 20/7/2023  |c RM121.93  |h Bookline Services 
650 0 |a Data protection 
650 0 |a Database management 
999 |a vtls000105262  |c 95008  |d 95008