Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Oracle Database

Welcome to the Oracle Database topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
323 Members
0 Online
7719 Visits

 Recent Discussions

Breach of Homeland Security Background Checks ... Posted by Ian Cooke.
Sources of Assurance. Posted by Ian Cooke.
Understanding SQL Injection. Posted by Ian Cooke.

Community Leader

Ian Cooke

Ian Cooke

Title: IT Audit Manager

Points: 53360

Badge: Influential

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 258 total

Must be a Topic member to contribute
View All »
Breach of Homeland Security Background Checks Raises Red Flags http://www.darkreading.com/breach-of-homeland-security-background-checks-raises-red-flags/d/d-id/1306624?
Ian Cooke | 8/26/2014 3:49:47 AM | COMMENTS(0)
Guys, I have updated the "Sources of Assurance for an Oracle Database" document to reflect changed links. I have uploaded it under "documents & publications".   If you know of any other sources that should be included please do not hesitate to contact me...
Ian Cooke | 8/26/2014 2:51:53 AM | COMMENTS(0)
Understanding SQL Injectionhttp://blog.schemaczar.com/2014-08/understanding-sql-injection-really/
Ian Cooke | 8/16/2014 1:04:46 PM | COMMENTS(0)
Just back from holidays and only catching up on the news.  This was some haul. Biggest Cache of Stolen Creds Ever Includes 1.2 Billion Unique Logins http://www.darkreading.com/biggest-cache-of-stolen-creds-ever-includes-12-billion-unique-logins/d/d-id/12...
Ian Cooke | 8/16/2014 12:45:00 PM | COMMENTS(3)
How to choose the right Oracle database for your budget and business needs http://www.itproportal.com/2014/08/13/how-choose-right-oracle-database-your-budget-business-needs/
Ian Cooke | 8/14/2014 6:43:35 AM | COMMENTS(0)
Hello everyone, I have audited windows databases before but now i have been assigned to audit an Oracle database, 11g for a large department. I need assistance on how to go about it and if any one has an Audit program kindly share it with me. Thank...
Bevan | 8/12/2014 9:12:21 AM | COMMENTS(3)

Documents & Publications: 19 total

Must be a Topic member to contribute
View All »
Sources of Assurance for an Oracle Database (Update 2) August 2014
Posted by Ian Cooke 3 days ago
Oracle Database Security Checklist An Oracle White Paper June 2008
Posted by Ian Cooke 3 days ago
Building Secure Apex Application
Posted by nooruddin 7 days ago
Exploiting PL/SQL Injection on Oracle 12c by David Litchfield [david.litchfield@datacom.com.au]
Posted by Ian Cooke 41 days ago
Oracle Data Redaction is Broken by David Litchfield [david.litchfield@datacom.com.au]
Posted by Ian Cooke 41 days ago

Events & Online Learning: 4 total

Journal Articles: 4 total

Volume 2, 2014
by Ian Cooke, CISA, CGEIT, COBIT-F, CFE, CPTS, DipFM, ITIL-F, Six Sigma Green Belt
CAATs are a valuable tool for auditing Oracle databases.
Volume 1, 2011
by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark and Bryan Wise | Reviewed by Horst Karin, Ph.D., CISA, CISSP, ITIL
The strength of this book is its comprehensive knowledge, which is presented in an easy-to-understand style with useful supporting background information.
Volume 3, 2010
by ISACA | Reviewed by K. K. Mookhey, CISA, CISM, CISSP
A book review of the third edition of this popular ISACA title.
Volume 4, 2007
by Ying Shi, CISA, OCP

Wikis: 2 total

Blog Posts: 11 total

Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
During an audit you may find that shell scripts are used to connect to your Oracle database (these are often scheduled jobs).  In many instances this represents a security risk as the Oracle database password is hardcoded into the script.  This means th...
Posted By : Ian Cooke | 0 comments
The main idea I am trying to advocate with these posts is a simple one.  Compare a database you are auditing against a database that you know already meets the standards required by the organisation you are auditing. This is achieved by creating “CSV...
Posted By : Ian Cooke | 1 comments
We have covered most of the core items that should be consider when performing an Oracle database audit in previous posts, however there a number of other items that I would typically look into. Database Links A database link is an object in one databa...
Posted By : Ian Cooke | 0 comments
The company you are auditing should have a policy on what is being audited within your Oracle database.  The level of auditing will almost certainly be affected by the sensitivity of the data. Good examples and bench marks for auditing may be seen in th...
Posted By : Ian Cooke | 0 comments
Typically application access to an Oracle database is via one of two methods.  Either all users access the same database using a single (proxy) user which is defined in an initialisation (.INI) file, registry etc. Or the users access the database indiv...
Posted By : Ian Cooke | 1 comments