Discuss in 500 words or more why Oracle 12c has introduced two new roles – AUDIT_ADMIN and AUDIT_VIEWER. Include a discussion of what database auditing is and what it does. Consider why these new role

3/12/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=043902cf-f693-4caf-93d5-0ab98b9f46b9&course_id … 1/3 % 50 % 19 %2 SafeAssign Originality Report Database Security - 201930 - CRN160 - Thota •Week 8 Paper % 71 Total Score : High risk Pratibha Sugureddygari Submission UUID : b0b91467-9346-6662-c8c8-6d32b50133c4 Total Number of Reports 1 Highest Match 71 % Submission_Text.html Average Match 71 % Submitted on 03/10/19 10:12 PM EDT Average Word Count 670 Highest : Submission_Text.html % 71 Attachment  1 Institutional database  (6) Student paperStudent paper Student paperStudent paper Student paperStudent paper Student paperStudent paper Student paperStudent paper Student paperStudent paper Internet  (4) oracle-baseoracle-base ugentugent oracleoracle oracleoracle Global database  (1) Student paperStudent paper Top sources  (3) Excluded sources  (0) View Originality Report - Old Design Word Count : 670 Submission_T ext.html 33 11 22 44 1010 88 99 1111 77 55 66 33 Student paperStudent paper 11 Student paperStudent paper 99 oracle-baseoracle-base 3/12/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=043902cf-f693-4caf-93d5-0ab98b9f46b9&course_id … 2/3 Source Matches  (19) Student paper 100 % Student paper 65 % Student paper 71 % Student paper 62 % AUDIT_ADMIN and AUDIT_VIEWER To start with, auditing is the monitoring and recording of configured database actions form both the users of the database as well as the database non-users.

The actions of the database users are known through database auditing. Database administrators set up the auditing for the sake of security purposes so that users are not able to access information without permission. Therefore, database auditing helps in keeping a check on the actions of the database of the users. The users who are accepted in the through the client _identifier attribute in the database are referred to as the non-database users. Auditing this type of users unified audit policy condition or Oracle database real application security is used. There are many advantages associated with auditing. Firstly, Auditing is important in that it allows accountability for actions such as actions taken on the schema, table, or row which affects specific content (Groomer, & Murthy, 2018). Secondly, it helps in deterring intruders or users from inappropriate actions based on their accountability. Thirdly, auditing notifies auditors of actions of an authorized user for instance when an intruder changes or deletes any file or if an operator has extra rights than anticipated. Lastly, auditing helps in data monitoring and data gathering concerning a particular event in the database such the tables updating, the logical I/Os being completed or the simultaneous operators who can link in the at the pick times. It is possible to configure the audit for both successful and failed activities as well as including or excluding specific users from the audit. Apart from auditing the standard activities provided by the database, auditing can also initially; users were allowed adding and removing audit configuration to objects in their own schemas without any additional privileges. However with the introduction of two new roles by oracle 12c which are AUDIT_ ADMIN and AUDIT_ VIEWER the case is totally different. The two new roles facilitate responsibilities separation in the process of auditing. In audit configuration, it is not necessary having the dba role or connecting as sysdba. In the side of security, this is a very big improvement. AUDIT_ADMIN is used by the administrators in configuring, auditing and administration of both unified audit policies and fine-grained policies and this role also helps in viewing and analyzing audit data, which is the primary role of the security administrator (Ravikumar, Krishnakumar, & Basha, 2017). In order for an auditor to perform any kind of auditing, they must be granted the audit admin_ role. Having an AUDIT_ADMIN, creating, altering, enabling, disabling and dropping audit policies, viewing audit data, as well as managing the trail of unified audit becomes easier for auditors. AUDIT_VIEWER, on the other hand, is used by the auditors in viewing and analyzing audit data only. This role is typically granted to the external auditors, and the auditors can only view audit data after being granted the AUDIT_VIEWER role. It provides the executive privilege on the package of DBMS_AUDIT_UTIL PL/SQL. The provision of these two new roles is helpful in that it provides an audit performance which is much faster as compared to the previous releases of the Oracle database. It has easier controlling how the audit records are written on the audit trail. The audit data can be written immediately or it can also be queued in the memory. The introduction of audit policies and the unified audit trail has helped in simplifying the configuration of database auditing in Oracle 12c. The auditing of the database has always been extremely flexible; however, this flexibility has always made feel complicated. References Groomer, S. M., & Murthy, U. S. (2018). Continuous auditing of database applications: An embedded audit module approach. In Continuous Auditing: Theory and Application (pp. 105-124). Emerald Publishing Limited. http://www.dba86.com/docs/oracle/12.2/DBSEG/introduction-to-auditing.htm Ravikumar, Y. V., Krishnakumar, K. M., & Basha, N. (2017). Oracle Database Upgrade and Migration Methods: Including Oracle 12c Release 2. Apress. 11 22 33 44 55 66 77 22 33 33 88 44 99 11 11 11 1010 1111 1111 1 Student paper AUDIT_ADMIN and AUDIT_VIEWER Original source audit-admin and audit-viewer 2 Student paper To start with, auditing is the monitoring and recording of configured database actions form both the users of the database as well as the database non- users. Original source Auditing involves monitoring as well as recording on all configured databases actions from databases users and non- users 3 Student paper The actions of the database users are known through database auditing.

Database administrators set up the auditing for the sake of security purposes so that users are not able to access information without permission.

Therefore, database auditing helps in keeping a check on the actions of the database of the users. Original source Database auditing is required to keep a check on the database actions of the users For security purposes, database administrators set up the auditing for example cases where without the permission to access information the users should be able to not access it Database auditing is required to keep a check on the database actions of the users 4 Student paper The users who are accepted in the through the client _identifier attribute in the database are referred to as the non- database users. Original source Non database users are recognized by the database by using the attribute called CLIENT_IDENTIFIER and also it refers only to the application users 3/12/2019 Originality Report https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=043902cf-f693-4caf-93d5-0ab98b9f46b9&course_id … 3/3 oracle 68 % Student paper 64 % oracle 71 % Student paper 72 % Student paper 65 % Student paper 66 % Student paper 72 % Student paper 63 % oracle-base 75 % Student paper 100 % Student paper 100 % Student paper 100 % Student paper 100 % ugent 100 % ugent 100 % 5 Student paper Auditing this type of users unified audit policy condition or Oracle database real application security is used. Original source Configuring a Unified Audit Policy for Oracle Database Real Application Security 6 Student paper There are many advantages associated with auditing. Original source There are many advantages that are associated with computer audit software 7 Student paper Secondly, it helps in deterring intruders or users from inappropriate actions based on their accountability. Original source Deter users (or others, such as intruders) from inappropriate actions based on their accountability 2 Student paper It is possible to configure the audit for both successful and failed activities as well as including or excluding specific users from the audit. Original source The audit can be configured for both failed and successful activities, as well as including or excluding particular users from the process 3 Student paper However with the introduction of two new roles by oracle 12c which are AUDIT_ ADMIN and AUDIT_ VIEWER the case is totally different. Original source Oracle 12c has introduced two new roles - AUDIT_ADMIN and AUDIT_VIEWER for unified auditing 3 Student paper AUDIT_ADMIN is used by the administrators in configuring, auditing and administration of both unified audit policies and fine-grained policies and this role also helps in viewing and analyzing audit data, which is the primary role of the security administrator (Ravikumar, Krishnakumar, & Basha, 2017). Original source AUDIT_ADMIN is the role which enables the administrator to configure auditing and administer both unified audit policies and fine-grained audit policies and view and analyze audit data, which is the role of a security administrator 8 Student paper In order for an auditor to perform any kind of auditing, they must be granted the audit admin_ role. Original source To perform any kind of audits you must be granted the Audit_Admin Role 4 Student paper AUDIT_VIEWER, on the other hand, is used by the auditors in viewing and analyzing audit data only. Original source And another AUDIT_VIEWER used for viewing and analyzing the data in auditing 9 Student paper The introduction of audit policies and the unified audit trail has helped in simplifying the configuration of database auditing in Oracle 12c. The auditing of the database has always been extremely flexible; Original source The introduction of audit policies and the unified audit trail simplifies the configuration of database auditing in Oracle 12c Database auditing has always been extremely flexible, but that flexibility has also served to make it feel complicated 1 Student paper M., & Murthy, U. Original source M., & Murthy, U 1 Student paper Continuous auditing of database applications: An embedded audit module approach. In Continuous Auditing: Theory and Application (pp. Original source Continuous auditing of database applications An embedded audit module approach In Continuous Auditing Theory and Application (pp 1 Student paper Emerald Publishing Limited. Original source Emerald Publishing Limited 10 Student paper http://www.dba86.com/docs/oracle/12.2/ DBSEG/introduction-to-auditing.htm Original source http://www.dba86.com/docs/oracle/12.2/ DBSEG/introduction-to-auditing.htm 11 Student paper V., Krishnakumar, K. M., & Basha, N. Original source V, Krishnakumar, K M, & Basha, N 11 Student paper Oracle Database Upgrade and Migration Methods: Including Oracle 12c Release 2. Original source Oracle Database Upgrade and Migration Methods Including Oracle 12c Release 2