08-10-2010, 10:48 AM
[attachment=5385]
Security systems
whether pure software or a combination of hardware and software – must store and manage critical information reliably. Because these systems are a crucial part of the security infrastructure for enterprises, they have unusual requirements not common to many business applications that use database technology. Choosing the right database product can increase reliability, improve performance and enhance the level of security provided by mission-critical deployed systems.
Securing Data from Attack
Security infrastructure, just like other applications, operates on data – user passwords, profile and preferences, roles and responsibilities, access logs, configuration settings and more. Unlike many business applications, though, security infrastructure products must be hardened against attack. As a result, the components that make up the security software, including any database system, must be designed for secure deployment. Security threats can come from a number of implementation choices in software. Especially common, though, are threats due to exposed administrative or user-level interfaces, which allow an attacker to communicate directly with a subsystem in the security product. Many database systems rely on such interfaces in normal operation.
Designers of security infrastructure are often best served by choosing a truly embeddable database management system, rather than a conventional RDBMS designed for business applications, for use in their products. A commercial embedded database can provide all the performance, reliability and recoverability guarantees that applications require, and can also improve overall security by eliminating interfaces that could be use to compromise the system.
Oracle’s family of embedded database products, including Oracle Database, Oracle TimesTen In-Memory Database, Oracle Berkeley DB and Oracle Database Lite, was designed for use in applications that need fast, reliable storage services, without requiring a database administrator. These products can be deployed for zero or near zero administration, so that they are invisible and inaccessible to users and malicious attackers.
EMBEDDED DATABASE TECHOLOGY
FOR SECURITY SYSTEMS
FOR SECURITY SYSTEMS
Security systems
whether pure software or a combination of hardware and software – must store and manage critical information reliably. Because these systems are a crucial part of the security infrastructure for enterprises, they have unusual requirements not common to many business applications that use database technology. Choosing the right database product can increase reliability, improve performance and enhance the level of security provided by mission-critical deployed systems.
Securing Data from Attack
Security infrastructure, just like other applications, operates on data – user passwords, profile and preferences, roles and responsibilities, access logs, configuration settings and more. Unlike many business applications, though, security infrastructure products must be hardened against attack. As a result, the components that make up the security software, including any database system, must be designed for secure deployment. Security threats can come from a number of implementation choices in software. Especially common, though, are threats due to exposed administrative or user-level interfaces, which allow an attacker to communicate directly with a subsystem in the security product. Many database systems rely on such interfaces in normal operation.
Designers of security infrastructure are often best served by choosing a truly embeddable database management system, rather than a conventional RDBMS designed for business applications, for use in their products. A commercial embedded database can provide all the performance, reliability and recoverability guarantees that applications require, and can also improve overall security by eliminating interfaces that could be use to compromise the system.
Oracle’s family of embedded database products, including Oracle Database, Oracle TimesTen In-Memory Database, Oracle Berkeley DB and Oracle Database Lite, was designed for use in applications that need fast, reliable storage services, without requiring a database administrator. These products can be deployed for zero or near zero administration, so that they are invisible and inaccessible to users and malicious attackers.