TEC 5363 Database Security

Syllabus
Schedule
Reading
Discussion
Project
Test
Resource
Tip

Learning Objectives of
Chapter
2 Operating System Security Fundamentals

Upon completion of this chapter, you should be able to:
  1.   Explain the functions of an operating system
  2.   Describe the operating system security environment from a database perspective
  3.   List the components of an operating system security environment
  4.   Explain the differences between authentication methods
  5.   Outline useful user administration best practices
  6.   List the criteria of strong password policies
  7.   Describe operating system vulnerabilities
  8.   Describe security risk posed by e-mail services
  9. Be able to install Oracle database into your operating system environment