Take the right steps when a breach of your Oracle Database environment becomes known or
suspected. You will learn techniques for discerning how an attacker got in what data they saw
and what else they might have done. This book helps you understand forensics in relation to
Oracle Database and the tools and techniques that should be used to investigate a database
breach. You will learn the measures to put in place now to make it harder for an attack to be
successful and to aid in the detection and investigation of future attacks. You will know how
to bring together tools and methods to create a holistic approach and investigation when an
event occurs helping you to be confident of your ability to react correctly and responsibly to
threats against your organization's data. What You'll Learn Detect when breaches have or may
have occurred React with confidence using an organized plan Determine whether a suspected
breach is real Determine the scope of data that has been compromised Preserve evidence for
possible criminal prosecutions Put in place measures to aid future investigations Who This Book
is For Database administrators system administrators and other technology professionals who
may be called upon to investigate breaches of security involving Oracle Database