X hits on this document

239 views

0 shares

0 downloads

0 comments

16 / 78

16

© 2010 Oracle Corporation – Proprietary and Confidential

Security Consideration

Security Threat

Data confidentiality and integrity

Man-in-the-Middle attacks

Data availability

Denial-of-Service attacks

Authentication

Password crack attacks

Segregation of duties

Exploitation of authorization

Non-repudiation

Repudiation

Enterprise Security Considerations and Threats

Authentication

The process to verify the identity, usually username and password, claimed by a user

Password crack attacks

Obtains password from an authentication exchange, then uses the password to log on to Enterprise Manager Grid Control

For examples: guess, dictionary and brute force attacks

Document info
Document views239
Page views240
Page last viewedThu Dec 08 16:48:38 UTC 2016
Pages78
Paragraphs1668
Words6426

Comments