Upon completion of this chapter, you should be able to: - Define and use a profile
- Design and implement password policies
- Implement password policies in Oracle
- Grant and revoke user privileges
- Create, assign, and revoke user roles
- List the best practices for securing a network environment.
|