Upon completion of this chapter, you should be able to:
- Explain the functions of an operating system
- Describe the operating system security environment from a database perspective
- List the components of an operating system security environment
- Explain the differences between authentication methods
- Outline useful user administration best practices
- List the criteria of strong password policies
- Describe operating system vulnerabilities
- Describe security risk posed by e-mail services
- Be able to install Oracle database into your operating system environment
|