O ESTUDO DOS PONTOS FORTES DA SEGURANÇA DO BANCO DE
DADOS ORACLE 11G RELEASE 2
SACCO, Luiz Antonio
)DFXOGDGH0XQLFLSDO3URIHVVRU)UDQFR0RQWRUR)03)0
OXL]DQWRQLRVDFFR#JPDLOFRP
$&(7,3DWUtFLD$SDUHFLGD=LERUGL
)DFXOGDGH0XQLFLSDO³3URI)UDQFR0RQWRUR´)03)0
SDWULFLD]LERUGL#XROFRPEU
RESUMO: 2REMHWLYRGHVWHDUWLJRpHVWXGDURVSRQWRVIRUWHVGDVHJXUDQoDGREDQFRGHGDGRV2UDFOH
*HPVXDYHUVmRPDLVUHFHQWH2EDQFRGHGDGRV2UDFOHIRLHVFROKLGDSDUDHVWHHVWXGRGHYLGR
DVHUSDUWHGRSRUWIyOLRGHVROXo}HVSDUDXPDJUDQGHTXDQWLGDGHGHHPSUHVDV$2UDFOHpDSULPHLUD
HPSUHVDDGHVHQYROYHUHLPSODQWDUGHVHXVVRIWZDUHVSDUDLQWHUQHWFRPRSURGXWRVGHEDQFRGH
GDGRVDSOLFDo}HVGHQHJyFLRVHGHVHQYROYLPHQWRGHDSOLFDo}HV2EDQFRGHGDGRV2UDFOHpXPGRV
EDQFRVGHGDGRVPDLVFRJLWDGRVGHYLGRjVHJXUDQoDSURWHomRGHGDGRVFDSDFLGDGHGHDXGLWRULDH
UHFXSHUDomRGHGDGRVFRPSOHWR(OHWHPXPDLQWHUIDFHDPLJiYHOSDUDWUDEDOKDUHSRGHVHUDSOLFDGR
HPGLIHUHQWHVPHUFDGRV(OHpHTXLSDGRGHFDUDFWHUtVWLFDVGHHOLPLQDomRGHUHGXQGkQFLDRFLRVRTXH
SHUPLWHXPUiSLGRWUiIHJRGHGDGRVQDUHGHHPDLVLPSRUWDQWHFRPPXLWDVHJXUDQoD
PALAVRAS-CHAVE: Oracle, Banco de Dados, Segurança e SGBD.
ABSTRACT: The objective of this article it to study the strengths of security from Oracle Database
11G, in its more recent version. The Oracle Database was chosen for this study due to be part of the
SRUWIROLRRIVROXWLRQVIRUDODUJHTXDQWLW\RIFRPSDQLHV7KH2UDFOHLVWKH¿UVWFRPSDQ\WRGHYHORSDQG
deploy 100% of its sofwares for internet, as database products, business applications and development
of applications. The Oracle DB is one of most bandied databases due to the security, protection of data,
ability to audit and full data recovery. It has a friendly user interface to work and can be applied in diffeUHQWPDUNHWV,WLVSURYLGHGRIHOLPLQDWLRQLGOHUHGXQGDQF\IHDWXUHVDOORZLQJDTXLFNO\WUDI¿FRIWKHGDWD
on the network and, most important, very safely.
KEYWORDS: Oracle, Database, Security and SGBD.
1. INTRODUÇÃO
1.1. Conceito de Banco de dados
8P EDQFR GH GDGRV p XPD FROH
omR GH GDGRV UHODFLRQDGRV SRVVXLQGR DV
VHJXLQWHVSURSULHGDGHVLPSOtFLWDV
5HSUHVHQWD DOJXP DVSHFWR GR
PXQGR UHDO PLQLPXQGR RX XQLYHUVR GH
GLVFXUVR
e XPD FROHomR GH GDGRV ORJL
FDPHQWHFRHUHQWHVHTXHSRVVXHPDOJXP
VLJQL¿FDGRLQHUHQWH
e SURMHWDGR FRQVWUXtGR H LQV
WDQFLDGR ³SRYRDGR´ SDUD XPD DSOLFDomR
HVSHFt¿FD
>5$0(=@
8P%DQFRGH'DGRVpXPDFROH
100
ção logicamente coerente de dados com
XP GHWHUPLQDGR VLJQL¿FDGR LQHUHQWH ,VWR
VLJQL¿FDTXHXPFRQMXQWRDOHDWyULRGHGD
GRV QmR SRGH VHU FRQVLGHUDGD XP %DQFR
de Dados.
8P%DQFRGH'DGRVpSURMHWDGR
FRQVWUXtGRHFRPSRVWRSRUXPFRQMXQWRGH
GDGRVSDUDXPSURSyVLWRHVSHFt¿FR([LVWH
XP JUXSR GH XVXiULRV RX DOJXPDV DSOLFD
o}HVSUpFRQFHELGDVRQGHHVWHVGDGRVVH
rão utilizados.
8P %DQFR GH 'DGRV UHSUHVHQWD
DVSHFWRV GH XPD SDUWH UHVWULWD GR PXQGR
real, denominado de PLQLPXQGR$OWHUDo}HV
TXH RFRUUD QR PLQLPXQGR VmR UHÀHWLGDV QR
Banco de Dados.
Resumindo, um Banco de Dados
UHSUHVHQWDXPDIRQWHGHRQGHLQIRUPDo}HV
Interciência
& Sociedade
VmR GHULYDGDV SRVVXL XP QtYHO GH LQWHUD
omR FRP HYHQWRV TXH RFRUUHP QR PXQGR
UHDOHXPDDXGLrQFLDTXHHVWiLQWHUHVVDGD
em seu conteúdo.
>)857$'2@
(VWXGRGH0HUFDGR
8PDEUHYHSHVTXLVDFRPRVEDQ
FRV GH GDGRV XWLOL]DGRV QDV HPSUHVDV QR
Brasil e no Mundo.
Figura 1: Bancos de dados utilizados nas or
JDQL]Do}HV QR %UDVLO )RQWH *UXSR ,PSDFWD
SULYDFLGDGHVmRDVJDUDQWLDVGHTXHRVGD
GRVVyVHUmRDFHVVDGRVVRPHQWHSRUSHV
soas autorizadas.
,QWHJULGDGHJDUDQWHTXHXPDPHQ
VDJHPGDGRHPDLODUTXLYRHWFQmRIRL
DOWHUDGRVHPDXWRUL]DomRVHUtQWHJURPDQ
WHUVHRPHVPR
2FRQFHLWRGH6HJXUDQoDHP7,RX
6HJXUDQoDGH&RPSXWDGRUHVHVWiUHODFLR
QDGRFRPRGH6HJXUDQoDGD,QIRUPDomR
LQFOXLQGRQmRDSHQDVDVHJXUDQoDGRVGD
GRVLQIRUPDomRPDVWDPEpPDGRVVLVWH
mas em si.
Atualmente o conceito de Segu
UDQoDGD,QIRUPDomRHVWiSDGURQL]DGRSHOD
QRUPD ,62,(& LQÀXHQFLDGD
SHOR SDGUmR LQJOrV %ULWLVK 6WDQGDUG %6
$VpULHGHQRUPDV,62,(&IRL
UHVHUYDGDSDUDWUDWDUGHSDGU}HVGH6HJX
UDQoD GD ,QIRUPDomR LQFOXLQGR D FRPSOH
PHQWDomR DR WUDEDOKR RULJLQDO GR SDGUmR
inglês.
A segurança da informação está
UHODFLRQDGDFRPSURWHomRGHXPFRQMXQWR
GHGDGRVQRVHQWLGRGHSUHVHUYDURYDORU
TXHSRVVXHPSDUDXPLQGLYtGXRRXXPDRU
ganização.
>81,&$03@
&RQFHLWR EiVLFR GH 6HJXUDQoD HP
Banco de dados
Figura 2: Bancos de Dados utilizados nas or
JDQL]Do}HVQR0XQGR)RQWH,'&:RUOG:LOGH
2. Conceitos de Segurança
&RQFHLWRGH6HJXUDQoDHP7HFQRORJLD
GD,QIRUPDomR
&RQFHLWRGHVHJXUDQoDGH7,HVWi
LQWLPDPHQWH OLJDGR FRP SURWHomR GH XP
FRQMXQWR GH GDGRV QR VHQWLGR GH SUHVHU
YDURYDORUTXHSRVVXHPSDUDXPLQGLYtGXR
RXXPDRUJDQL]DomRDFRQ¿GHQFLDOLGDGHRX
101
Os bancos de dados de uma em
SUHVD FRQWrP XPD JUDQGH TXDQWLGDGH GH
dados e geralmente um grande número de
usuários. A maioria destes usuários não
tem a necessidade de acessar todos os
GDGRV$VVLPSHUPLWLURDFHVVRLUUHVWULWRD
WRGRV RV GDGRV SRGH VHU LQGHVHMiYHO H R
6*%'6LVWHPDJHUHQFLDGRUGH%DQFRGH
'DGRVGHYHSURYHUPHFDQLVPRVSDUDFRQ
WURODU HVWH DFHVVR VHQGR SRU XVXiULRV RX
PHVPR HP DSOLFDo}HV TXH HVWDUmR DFHV
sando os dados.
$WUDYpVGRFRQWUROHGHDFHVVRGLV
FULFLRQiULR FDWiORJRV R EDQFR GH GDGRV
PDQWpPXPUHJLVWURGRVVHXVREMHWRVHGRV
SULYLOpJLRV TXH FDGD XVXiULR RX JUXSR GH
XVXiULRV SRVVXL VREUH RV GDGRV DORFDGRV
no banco de dados.
&RQWUROH GH DFHVVR 6*%'V 6LV
WHPD JHUHQFLDGRU GH %DQFR GH 'DGRV
FRQWURODPRDFHVVRDRVGDGRVDWUDYpVGR
Interciência
& Sociedade
controle de acesso discricionário. Esse
FRQWUROH p EDVHDGR QR FRQFHLWR GH GLUHL
WRV GH DFHVVR RX SULYLOpJLRV H D PDQHLUD
GHFRQFHGHUHVWHVSULYLOpJLRVDRVXVXiULRV
8PSULYLOpJLRSHUPLWHTXHXPXVXiULRDFHV
VHRGDGRGHFHUWDPDQHLUDSRUH[HPSOR
OHQGRRXDOWHUDQGRRVGDGRV
8PXVXiULRTXHFULDXPREMHWRDX
WRPDWLFDPHQWH DGTXLUH WRGRV RV GLUHLWRV
VREUHRPHVPR$SDUWLUGHHQWmRREDQFR
GH GDGRV JXDUGD WRGRV RV SULYLOpJLRV TXH
são concedidos a outros usuários e des
WD IRUPD JDUDQWH TXH DSHQDV RV XVXiULRV
DXWRUL]DGRVSRVVDPDFHVVDUHVWHVREMHWRV
(PSUDWLFDPHQWHWRGRVRVEDQFRV
de dados, o controle de acesso discricio
QiULR p LPSOHPHQWDGR DWUDYpV GR XVR GRV
FRPDQGRV*5$17H5(92.(2FRPDQ
GR *5$17 FRQFHGH SULYLOpJLRV VREUH RV
REMHWRV GR EDQFR GH GDGRV WDEHODV H YL
V}HVGHQWUHRXWURVDRXWURVXVXiULRVHQ
TXDQWR TXH R FRPDQGR 5(92.( UHYRJD
RVSULYLOpJLRVFRQFHGLGRV3DUDXPPHOKRU
entendimento do mecanismo de acesso
GLVFULFLRQiULRpLPSRUWDQWHFRPSUHHQGHUD
GH¿QLomRGHSULYLOpJLRVREMHWRVHXVXiULRV
8VXiULRVVmRDVSHVVRDVTXHHV
WmR UHSUHVHQWDGDV SRU XP QRPH GH DXWR
UL]DomR 2V XVXiULRV SRGHP VHU FODVVL¿
FDGRVHPJUXSRVGHDFRUGRFRPXPSHU¿O
RX QtYHO GH DXWRUL]DomR 8P XVXiULR TXH
SHUWHQFHDXPJUXSRLPSOLFLWDPHQWHUHFH
EHRVSULYLOpJLRVUHODFLRQDGRVDRJUXSRTXH
HOHSHUWHQFH
3ULYLOpJLR 'H¿QH XPD SHUPLVVmR
LQGLYLGXDO DVVRFLDGD D XP QRPH DXWRUL]D
GRKDELOLWDQGRRDDFHVVDURXPRGL¿FDUXP
UHFXUVRGREDQFRGHGDGRV2VSULYLOpJLRV
WDPEpP SRGHP VHU FRQFHGLGRV D JUXSRV
GH XVXiULRV RX PHVPR D DSOLFDo}HV TXH
H[HFXWDPFRPDQGRVQREDQFR
Objetos: os usuários necessitam
GHSULYLOpJLRVSDUDDFHVVDURVREMHWRVJXDU
GDGRV QR EDQFR GH GDGRV 2V SULYLOpJLRV
YDULDP GH DFRUGR FRP D QDWXUH]D GR RE
MHWR3RUH[HPSORXPDWDEHODSRVVXLXPD
OLVWDGHSULYLOpJLRVGLIHUHQWHGDVYLV}HVVmR
HODVWDEHODVYLV}HVtQGLFHVWULJJHUVHQWUH
RXWURV>81,&$03@
3. História Oracle
2 %DQFR GH GDGRV 2UDFOH p XP
102
6*%' 6LVWHPD JHUHQFLDGRU GH %DQFR
GH 'DGRV TXH VXUJLX QR ¿P GRV DQRV
TXDQGR /DUU\ (OOLVRQ YLVOXPEURX XPD
RSRUWXQLGDGH TXH RXWUDV FRPSDQKLDV QmR
KDYLDPSHUFHELGRTXDQGRHQFRQWURXXPD
GHVFULomRGHXPSURWyWLSRIXQFLRQDOGHXP
%DQFRGH'DGRVUHODFLRQDOHGHVFREULXTXH
QHQKXPDHPSUHVDWLQKDVHHPSHQKDGRHP
comercializar essa tecnologia.
(OOLVRQHRVFRIXQGDGRUHVGD2UD
FOH&RUSRUDWLRQ%RE0LQHUH(G2DWHVSHU
FHEHUDPTXHKDYLDXPWUHPHQGRSRWHQFLDO
GH QHJyFLRV QR PRGHOR GH EDQFR GH GD
dos relacional tornando assim a maior em
SUHVDGHVRIWZDUHHPSUHVDULDOGRPXQGR
26*%'GD2UDFOHpOtGHUGHPHUFDGR2
2UDFOHLIRLSLRQHLURQRVXSRUWHDRPRGHOR
ZHE22UDFOHJPDLVUHFHQWHVHEDVHLD
na tecnologia de grid. Recentemente fora
ODQoDGRR2UDFOHJTXHYHLRFRPPHOKR
ULDVHPUHODomRDR2UDFOHJ
$OpPGD%DVHGH'DGRVD2UDFOH
GHVHQYROYHXPDVXtWHGHGHVHQYROYLPHQWR
FKDPDGDGH2UDFOH'HYHORSHU6XLWHXWLOL
]DGDQDFRQVWUXomRGHSURJUDPDVGHFRP
SXWDGRUTXHLQWHUDJHPFRPDVXDEDVHGH
GDGRV$2UDFOHWDPEpPFULRXDOLQJXDJHP
GHSURJUDPDomR3/64/XWLOL]DGDQRSUR
FHVVDPHQWRGHWUDQVDo}HV
2 %DQFR GH GDGRV 2UDFOH p GH
VHQYROYLGRHP129$<25.(8$HDWXDO
PHQWH D XOWLPD YHUVmR p D J UHOHDVH IRLGHVHQYROYLGRHP2UDFOHFRQWLQXD
FRPDYHUVmRGR2UDFOHJpD~OWLPDQR
PRPHQWRHDLQGDHVWipDYHUVmRGR%DQFR
de
'DGRV PDLV SRSXODU GR PXQGR
&RPPDLVGHUHFXUVRVPLOK}HVGH
KRUDVGHWHVWHVHSHVVRDPHVHVGH
GHVHQYROYLPHQWR R EDQFR GH GDGRV 2UD
FOH J GHVWDFDVH FRPR R VRIWZDUH PDLV
LQRYDGRUHGHPDLVDOWDTXDOLGDGHMiODQoD
GRSHOD2UDFOH³2EDQFRGHGDGRV2UDFOH
JFRQVWUXtGRFRPDQRVGHH[SHULrQ
cia em design, oferece recursos de última
JHUDomR SDUD JHUHQFLDPHQWR GH LQIRUPD
o}HVHPSUHVDULDLV´D¿UPD$QG\0HQGHOVR
KQ YLFHSUHVLGHQWH VrQLRU GH 7HFQRORJLDV
GH6HUYLGRUGH%DQFRGH'DGRVGD2UDFOH
³0DLV GR TXH QXQFD QRVVRV FOLHQWHV HQ
IUHQWDPGHVD¿RVWDLVFRPRUiSLGRFUHVFL
mento dos dados, aumento da integração
HQWUHHOHVHSUHVV}HVQRFXVWRGDWHFQROR
Interciência
& Sociedade
JLDSDUDFRQHFWLYLGDGH2%DQFRGH'DGRV
2UDFOHJIRLSLRQHLURHPJULGFRPSXWLQJH
mais da metade dos clientes Oracle migra
UDPSDUDHVVDYHUVmR$JRUDR%DQFRGH
'DGRV2UDFOHJRIHUHFHRVUHFXUVRVTXH
VROLFLWDUDP SDUD DFHOHUDU D DPSOD DGRomR
HFUHVFLPHQWRGRVJULGV2UDFOHUHSUHVHQ
WDQGRXPDLQRYDomRUHDOTXHVHYROWDSDUD
GHVD¿RVUHDLVWUD]LGRVDWpQyVSRUFOLHQWHV
UHDLV´FRPSOHWD
Com o Banco de Dados Oracle
J DV RUJDQL]Do}HV SRGHUmR DVVXPLU R
FRQWUROH GH VXDV LQIRUPDo}HV HPSUHVD
ULDLVWHUHPXPDPHOKRUYLVmRGRVQHJyFLRV
H DGDSWDUVH FRP UDSLGH] D XP DPELHQWH
FRPSHWLWLYRTXHSDVVDSRUJUDQGHVPXGDQ
ças.
$QRYDYHUVmRDXPHQWDDFDSDFL
GDGHGH&OXVWHUGH%DQFRGH'DGRVDOpP
GH DFHOHUDU D DXWRPDomR GR 'DWD&HQWHU
e o gerenciamento da carga de trabalho.
&RPJULGVVHJXURVDOWDPHQWHGLVSRQtYHLV
H HVFDOiYHLV GH VHUYLGRUHV H DUPD]HQD
PHQWR GH EDL[R FXVWR RV FOLHQWHV 2UDFOH
WrP VXSRUWH SDUD DV DSOLFDo}HV PDLV H[L
JHQWHV GH SURFHVVDPHQWR GH WUDQVDo}HV
GDWD ZDUHKRXVLQJ H JHVWmR GH FRQWH~GR
>25$&/(@
9HUV}HV ([LVWHQWHV GR %DQFR GH 'D
dos Oracle
103
Fonte: 2UDFOH
4. Vantagens e desvantagens do Oracle
11G
9DQWDJHQV
*UDQGHFDSDFLGDGHGHSHUIRUPDQ
FHSDUDGDGRVHPJUDQGHVTXDQWLGDGHV
Segurança nos dados, fornece
XPDVROXomRGHFULSWRJUD¿DPXLWRDYDQoD
GDSDUDRPHUFDGRGHQWURGHXPEDQFRGH
dados.
Possui controle de acesso, sendo
QHFHVViULR TXH R XVXiULR SUHFLVH VHU DX
WHQWLFDGRSDUDTXDOTXHUDFHVVRDR%DQFR
PHVPR TXH VHMD SDUD XP 6HOHFW VHQGR
HVWH FRQWUROH SRU FDPDGDV RX VHMD XP
XVXiULR SRGH WHU DFHVVR DSHQDV D XPD
tabela ou mesmo a uma coluna dentro de
uma tabela.
1mRSHUPLWHTXHRVGDGRVVHMDP
H[SRUWDGRVHPDUTXLYRVVLPSOHV
SURSRUFLRQDQGR XPD FRQ¿DELOLGD
de nos dados do banco de dados Oracle
TXDQGRVmRVDOYRVHWUDQVSRUWDGRV
3RVVXL R $GYDQFHG 6HFXULW\ TXH
SURWHJH D FRQ¿GHQFLDOLGDGH H LQWHJULGDGH
GRVGDGRVSDUDTXHSRVVDPWUDIHJDUSHOD
UHGHXVDQGRFULSWRJUD¿D
3RVVXLR2UDFOH'DWDEDVH)LUHZDOO
pXPDOLQKDGHGHIHVDSDUDEDQFRVGHGD
GRVIRUQHFHQGRPRQLWRUDPHQWRHPWHPSR
UHDO GD DWLYLGDGH GR EDQFR GH GDGRV QD
UHGH QmR SHUPLWLQGR TXH SURJUDPDV QHP
XVXiULRVFRQVLJDPDFHVVDURXYLVXDOL]DURV
GDGRVVHPDXWHQWLFDomRQREDQFRTXDQGR
os dados são trafegados.
2IHUHFHXPDVROXomRSDUDDSOLFD
omRGHTXDOTXHUFRUUHomRHPVHXDPELHQWH
incluindo seu núcleo, sem necessidade de
UHLQtFLRGRVHUYLoR,VWRIDFLOLWDPDQXWHQomR
ou mesmo ajustes urgentes em ambiente
GHSURGXomRSRLVHPDPELHQWHVFUtWLFRVp
FDGD YH] PDLV UDUR FRQVHJXLUVH XPD MD
QHODGHLQGLVSRQLELOLGDGHSDUDHVWHWLSRGH
Interciência
& Sociedade
FRUUHomR>)5((0$1@
'HVYDQWDJHQV
Alto Custo da Licença do banco de
GDGRV H GR KDUGZDUH RQGH R EDQFR HVWi
alocado.
([LJHHVSHFLDOL]DomRWpFQLFDVHMD
SDUDDGPLQLVWUDomRGREDQFR
7DUHIDV FRPR EDFNXSUHFRYHU\
WXQQLQJ PRQLWRUDPHQWR GRV VHUYLoRV GH
segurança, gerenciamento de acessos de
XVXiULRV 1mR SHUPLWH D UHFXSHUDomR GH
GDGRVHPXPSRQWRGRWHPSRGHWHUPLQDGR
RVGDGRVVySRGHPVHUUHVWDXUDGRVSDUDR
PRPHQWRRQGHR%DFNXSIRLUHDOL]DGR
Não são necessários triggers de
EDQFRGHGDGRVYLVXDOL]Do}HVQHPRXWUDV
DOWHUDo}HVGHDSOLFDWLYRV2$GYDQFHG6H
FXULW\(QFU\SWLRQFULSWRJUDIDRVGDGRVDXWR
PDWLFDPHQWHDQWHVGHOHVVHUHPJUDYDGRV
HPGLVFRHGHFRGL¿FDRVGDGRVDQWHVGHOHV
VHUHPUHWRUQDGRVDRDSOLFDWLYR2SURFHVVR
GHFULSWRJUD¿DHGHFRGL¿FDomRpFRPSOH
WDPHQWHVHJXURDDSOLFDWLYRVHDXVXiULRV
3RUWDQWRRXVXiULRRXDDSOLFDomR
SUHFLVDP VHU DXWHQWLFDGRV SDUD TXDOTXHU
DFHVVR DR %DQFR GH 'DGRV PHVPR TXH
VHMDSDUDXP6HOHFW>1(('+$0@
5. Pontos fortes da Segurança do Oracle
Data Basic 11G Release 2
([LVWHP YiULRV SRQWRV IRUWHV GD
segurança do Banco de Dados Oracle,
DEDL[RVHUmRGHVFULWRVDOJXQV
6HFXULW\(QFU\SWLRQ
A Oracle fornece uma solução de
FULSWRJUD¿D PXLWR DYDQoDGD QR PHUFDGR
GHEDQFRGHGDGRV&ULSWRJUDIDDXWRPDWL
FDPHQWHRVGDGRVJUDYDGRVSDUDRDUPD
zenamento do banco de dados Oracle e
GHVFULSWRJUDID DXWRPDWLFDPHQWH RV GDGRV
GHSRLVTXHRXVXiULRVROLFLWDQWHRXDSOLFDWL
YRIRLDXWHQWLFDGRQREDQFRGHGDGRV
7RGR SURFHVVR GH FRQWUROH GH
DFHVVRYHUL¿FDHLQFOXLDVDSOLFDo}HVSHOD
'DWDEDVH9DXOW/DEHO6HFXULW\SRLVSRVVXL
XPEDQFRGHGDGRVSULYDGRYLUWXDODJLOL]DQ
GRRSURFHVVR%DFNXSVGREDQFRGHGDGRV
PDQWpPRVGDGRVFRPFULSWRJUD¿DRXVHMD
ID]REDFNXSGRVGDGRVFRPSURWHomRFRP
LVVRiSURWHomRSDUDDVPtGLDVGHEDFNXS
1mRSHUPLWLQGRTXHRVGDGRVVHMDPH[SRU
WDGRVHPDUTXLYRVVLPSOHVSURSRUFLRQDQ
GRXPDFRQ¿DELOLGDGHQDVLQIRUPDo}HVGR
banco de dados.
2 2UDFOH 6HFXULW\ (QFU\SWLRQ p
D VROXomR GH FULSWRJUD¿D PDLV DYDQoDGD
QR VHWRU 8WLOL]D DOJRULWPRV GH FULSWRJUD¿D
SDGUmR H XP JHUHQFLDPHQWR GH FKDYHV
LQWHJUDGR SDUD IRUQHFHU XPD FULSWRJUD¿D
WUDQVSDUHQWHGHGDGRVGHDSOLFDWLYRVFRQ
¿GHQFLDLV
104
Figura 3: )RQWH2UDFOH6HFXULW\
$GYDQFHG6HFXULW\
&ULSWRJUD¿DGHGDGRVWUDQVSDUHQ
WH RIHUHFH FULSWRJUD¿D GH WDEHODV GH DSOL
FDomR EHP FRPR FROXQDV GH DSOLFDWLYRV
LQGLYLGXDLVGHDSOLFDWLYRVWDLVFRPRFDUWmR
GHFUpGLWRHQ~PHURVGHVHJXUDQoDVRFLDO
CPF, RG entre outros.
$7'(7UDQVSDUHQW'DWD(QFU\S
WLRQ SHUPLWH SURWHJHU HP QtYHO GH DWULEX
WRLQGLYLGXDORXHPQtYHOGHWRGDDWDEHOD
([HPSORVGHDWULEXWRVLQGLYLGXDLVLQFOXHP
LWHQV FRPR Q~PHURV GH LGHQWL¿FDomR 7R
dos os objetos do banco de dados criados
QDQRYDWDEHODVHUmRFRGL¿FDGRVDXWRPD
WLFDPHQWH WRGRV RV GDGRV VDOYRV VHUmR
FULSWRJUDIDGRV DSyV D H[HFXomR GR VFULSW
RXGDIXQomRH[HFXWDGDQREDQFR
8VDU D FULSWRJUD¿D GH WDEHOD GD
7'(SDUDFRGL¿FDUWRGDVDVWDEHODVGRDSOL
FDWLYR SURSRUFLRQD DLQGD PDLV VHJXUDQoD
e economia de custos. A necessidade de
LGHQWL¿FDUDWULEXWRVLQGLYLGXDLVTXHQHFHV
VLWDPGHFULSWRJUD¿DpFRPSOHWDPHQWHHOL
PLQDGD$OpPGLVVRDFULSWRJUD¿DGDWDEH
ODSURSRUFLRQDDLQGDPDLVVHJXUDQoDSRLV
WRGRVRVWLSRVGHGDGRVVmRVXSRUWDGRVH
QmRKiFXVWRVGHGHVHPSHQKRDVVRFLDGRV
Interciência
& Sociedade
FRPYDUUHGXUDVFRPSOH[DVGHLQWHUYDORVGH
tQGLFHVHPGDGRVFULSWRJUDIDGRV
4XDQGR RFRUUH R EDFNXS GR %'
RVDUTXLYRVFRGL¿FDGRVSHUPDQHFHPFULS
WRJUDIDGRV QDV PtGLDV GH GHVWLQR SURWH
JHQGR DV LQIRUPDo}HV PHVPR VH PtGLDV
IRUHPSHUGLGDVRXURXEDGDV
2VEDFNXSVFRGL¿FDGRVVmRGHFR
GL¿FDGRVDXWRPDWLFDPHQWHGXUDQWHRSHUD
o}HVGHUHVWDXUDomRHUHFXSHUDomRGR%'
%DQFR GH 'DGRV GHVGH TXH DV FKDYHV
GH GHFRGL¿FDomR H[LJLGDV HVWHMDP GLVSR
QtYHLV $ SURWHomR GRV GDGRV H[SRUWDGRV
GREDQFRGHGDGRV2UDFOHSRGHVHURE
WLGDFRPD7'(HPFRQMXQWRFRPR2UDFOH
'DWD3XPSTXHpXPVHUYLoRGHJHUDomR
GHFKDYHVGHVHJXUDQoDHEDFNXSV3RGH
VHXWLOL]DUFRPRFKDYHGHFULSWRJUD¿DXPD
FKDYH PHVWUD RX XPD IUDVH VHQKD FRP R
2UDFOH$GYDQFHG6HFXULW\>25$&/(@
QHFHVVLWDP GH 3.,V LPSOHPHQWDGRV $
FDGDQRYDYHUVmRGREDQFRGHGDGRVQR
YRVDOJRULWPRVGHFULSWRJUD¿DVmRLQFOXtGRV
jPHGLGDTXHVmRDSURYDGRVSHORVHWRU$
PDLVUHFHQWHDGLomRpR3DGUmR$YDQoDGR
GH &ULSWRJUD¿D $(6 XP DOJRULWPR DSUL
PRUDGRHPVHJXUDQoDHGHVHPSHQKRHP
relação ao DES.
2UDFOH$GYDQFHG(QFU\SWLRQ6HFX
ULW\ 1HWZRUN p FRPSOHWDPHQWH VHJXUR Ii
FLO GH FRQ¿JXUDU H QmR UHTXHU FHUWL¿FDGRV
; $ OLVWD FRPSOHWD GH DOJRULWPRV GH
LQWHJULGDGHGHGDGRVHFULSWRJUD¿Dp$(6
HELWV'(6HFKDYHV
ELWV 5& ELWV 6+$ >:$+/
@
Figura 4: Fonte 2UDFOH6HFXULW\
6HFXULW\1HWZRUN
2UDFOH6HFXULW\1HWZRUNSURWHJHD
FRQ¿GHQFLDOLGDGHHLQWHJULGDGHGRVGDGRV
TXHWUDIHJDPSHODUHGHXWLOL]DQGRFULSWRJUD
¿DGHUHGHLPSHGLQGRTXHRVGDGRVVHMDP
SHUGLGRVRXIDUHMDGRVRXPHVPRVHMDPFOR
QDGRV FDXVDQGR D SHUGD GH LQIRUPDo}HV
RX TXH SHVVRDV FDSWXUHP RV GDGRV QR
PHLRGRWUDIHJRSRGHQGRDOWHUDUFRSLDURX
PHVPRDSDJDUDVLQIRUPDo}HV
7RGDDFRPXQLFDomRFRPXPEDQ
FRGHGDGRV2UDFOHSHODUHGHSRGHVHUFULS
WRJUDIDGDFRPR2UDFOH6HFXULW\1HWZRUN
2 6HFXULW\ 1HWZRUN IRUQHFH FULSWRJUD¿D
QDWLYDDOJRULWPRVGHLQWHJULGDGHGHGDGRV
HVXSRUWHSDUD6HFXUH6RFNHW/D\HU66/
SDUDSURWHJHURVGDGRVDWUDYpVGDUHGH
Os algoritmos de integridade de
GDGRV H FULSWRJUD¿D QDWLYD QR 2UDFOH QmR
105
Figura 5: )RQWH2UDFOH1HWZRUN6HFXULW\
2UDFOH'DWDEDVH9DXOW
Os administradores de banco de
GDGRV RV '%$V $GPLQLVWUDGRU GH %DQ
FR GH 'DGRV SRVVXHP PXLWRV DFHVVRV
QREDQFRFRPR2UDFOH'DWDEDVH9DXOWD
SRVVLELOLGDGH GHLPSHGLU TXHXVXiULRVSUL
YLOHJLDGRVGHQWURGR%'%DQFRGH'DGRV
YHMDPGDGRVVLJLORVRVGDDSOLFDomRYHPVH
WRUQDQGR XP UHTXLVLWR FDGD YH] PDLV LP
SRUWDQWH QDV RUJDQL]Do}HV$OpP GLVVR D
FRQVROLGDomR GD DSOLFDomR UHTXHU HVWULWRV
OLPLWHVHQWUHGDGRVFRQ¿GHQFLDLVGDHPSUH
VDFRPRRVHQFRQWUDGRVHPDSOLFDo}HV¿
Interciência
& Sociedade
nanceiras e de recursos humanos.
2UDFOH9DXOWLPSHGHTXHRV'%$V
$GPLQLVWUDGRUGH%DQFRGH'DGRVSURSULH
WiULRVGHDSOLFDo}HVHRXWURVXVXiULRVSULYL
OHJLDGRVYHMDPGDGRVGDDSOLFDomRXVDQGR
VHXVSULYLOpJLRVDYDQoDGRV'DWDEDVH9DXOW
FRORFD HP SUiWLFD FRQWUROHV SUHYHQWLYRV
DMXGDQGRDUHGX]LURLPSDFWRSRWHQFLDOGH
XPDRFRUUrQFLDUHDOGHYLRODomRGHGDGRV
H SHUPLWLQGR TXH R '%$ H[HFXWH VHX WUD
EDOKRGHIRUPDPDLVH¿FD]9DXOWSRGHVHU
XVDGRSDUDSURWHJHUWRGDXPDDSOLFDomRRX
XPFRQMXQWRHVSHFt¿FRGHWDEHODVYLV}HV
WULJJHUVGHQWURGHXPDDSOLFDomRSHUPLWLQ
GRXPDDSOLFDomRGHVHJXUDQoDDOWDPHQWH
ÀH[tYHOHDGDSWiYHO
As regras de comando do Oracle
'DWDEDVH9DXOWDWLYDPFRQWUROHVGHDXWRUL
]DomR GH YiULRV IDWRUHV TXH VH HVWHQGHP
DOpP GDV DWULEXLo}HV WUDGLFLRQDLV GH EDQ
FR GH GDGRV 8VDQGR UHJUDV GH FRPDQGR
H DXWRUL]DomR GH YiULRV IDWRUHV R DFHVVR
DEDQFRVGHGDGRVSRGHVHUUHVWULWRDXPD
VXEUHGHRXVHUYLGRUGHDSOLFDo}HVHVSHFt
¿FR FULDQGR XP FDPLQKR YLUWXDO FRQ¿iYHO
SDUD R DFHVVR DRV GDGRV$ OLPLWDomR GH
DFHVVRDRVGDGRVDDSOLFDo}HVDSURYDGDV
SRGHVHUREWLGDXVDQGRIDWRUHVGR2UDFOH
'DWDEDVH9DXOWHPFRQMXQWRFRPUHJUDVGH
comando do Oracle. O Oracle Database
9DXOWRIHUHFHYiULRVIDWRUHVLQWHUQRVFRPR
HQGHUHoR ,3 TXH SRGHP VHU XVDGRV LQGL
YLGXDOPHQWH RX HP FRQMXQWR FRP RXWUDV
UHJUDV GH VHJXUDQoD SDUD DXPHQWDU VLJ
QL¿FDWLYDPHQWH R QtYHO GH VHJXUDQoD GH
XPDDSOLFDomRH[LVWHQWH$OpPGRVIDWRUHV
LQWHUQRV IRUQHFLGRV SHOR 9DXOW YRFr SRGH
DGLFLRQDUVHXVIDWRUHVSHUVRQDOL]DGRVSDUD
DWHQGHU DRV SUySULRV UHTXLVLWRV HPSUHVD
riais.
As regras de comando do Oracle
'DWDEDVH9DXOWRIHUHFHPDSRVVLELOLGDGHGH
LQFRUSRUDUSROtWLFDVGHVHJXUDQoDFRPIDFL
OLGDGH D SUDWLFDPHQWH TXDOTXHU RSHUDomR
de banco de dados. As regras de comando
SHUPLWHPTXHYRFrUHIRUFHFRQWUROHVLQWHU
QRV H LPSRQKD DV SUiWLFDV H SROtWLFDV GH
FRQ¿JXUDomRGHVHJXUDQoDUHFRPHQGDGDV
SHORPHUFDGR
$VUHJUDVGHFRPDQGRSRGHPVHU
XVDGDV SDUD DSOLFDU DOWRV QtYHLV GH SURWH
omR D GDGRV FUtWLFRV SDUD R QHJyFLR 3RU
H[HPSORXPDUHJUDGHFRPDQGRSRGHVHU
106
XVDGDSDUDLPSHGLUTXHTXDOTXHUXVXiULR
DWpPHVPRR'%$$GPLQLVWUDGRUGH%DQFR
GH'DGRVHOLPLQHWDEHODVGDDSOLFDomRQR
VHXDPELHQWHGHSURGXomR
$ÀH[LELOLGDGHGR2UDFOH9DXOWSHU
PLWHSHUVRQDOL]DUDVHSDUDomR GHUHVSRQ
VDELOLGDGHV GH DFRUGR FRP RV UHTXLVLWRV
HVSHFt¿FRV GDV RUJDQL]Do}HV e SRVVtYHO
VXEGLYLGLU DLQGD PDLV D UHVSRQVDELOLGDGH
GDDGPLQLVWUDomRGR%'%DQFRGH'DGRV
HP EDFNXS GHVHPSHQKR H DSOLFDomR GH
SDWFKHV
2 2UDFOH 9DXOW RIHUHFH LQ~PHURV
UHODWyULRVSURQWRVTXHOKHRIHUHFHPDSRV
VLELOLGDGHGHUHODWDUDVSHFWRVFRPRWHQWDWL
YDVGHVROLFLWDomRGHDFHVVRDGDGRVEOR
TXHDGRVSHOR9DXOW
5HVSRQVDELOLGDGHVQR2UDFOH9DXOW
$GPLQLVWUDGRU GH 6HJXUDQoD XP
DGPLQLVWUDGRU GH VHJXUDQoD SRGH FRQ¿
gurar as regras de Comando do Database
9DXOWDXWRUL]DURXWURVXVXiULRVDXWLOL]iORV
H H[HFXWDU YiULRV UHODWyULRV GH VHJXUDQoD
HVSHFt¿FRVGR'DWDEDVH9DXOW
Administração do Banco de Dados
'%$DUHVSRQVDELOLGDGHGHDGPLQLVWUDomR
GREDQFRGHGDGRVSHUPLWHTXHXPXVXiULR
FRP RV SULYLOpJLRV GH '%$ FRQWLQXH H[H
cutando o gerenciamento e a manutenção
normais associados ao banco de dados,
FRPREDFNXSHUHFXSHUDomRDSOLFDomRGH
SDWFKHVHDMXVWHGHGHVHPSHQKR
*HUHQFLDGRUGH&RQWDVXPXVX
iULR FRP D UHVSRQVDELOLGDGH GH JHUHQFLD
PHQWR GH FRQWDV SRGH FULDU HOLPLQDU RX
PRGL¿FDU XVXiULRV GR EDQFR GH GDGRV
>1(('+$0@
'DWD0DVNLQJ
Oracle Data Masking ajuda as or
JDQL]Do}HVDDWHQGHUDVGHPDQGDVGHSUL
YDFLGDGHHSURWHomRGHGDGRVFRPR6DU
EDQHV2[OH\3&,3D\PHQW&DUG,QGXVWU\
'66 'DWD 6HFXULW\ 6WDQGDUG +,3$$
+HDOWK ,QVXUDQFH 3RUWDELOLW\ DQG$FFRXQ
WDELOLW\$FW EHP FRPR LQ~PHUDV OHLV TXH
restringem o uso de dados reais do clien
te. Com o Oracle Data Masking, informa
o}HVVLJLORVDVFRPRQ~PHURVGHFDUWmRGH
FUpGLWRRXGHVHJXULGDGHVRFLDOSRGHPVHU
VXEVWLWXtGRV SRU YDORUHV UHDLV SHUPLWLQGR
TXH RV GDGRV GH SURGXomR VHMDP XVDGRV
Interciência
& Sociedade
GH IRUPD VHJXUD SDUD GHVHQYROYLPHQWR
WHVWH RX FRPSDUWLOKDPHQWR FRP SDUFHLURV
WHUFHLUL]DGRV RX RIIVKRUH SDUD RXWUDV ¿
QDOLGDGHV TXH QmR VHMDP GH SURGXomR 2
Oracle Data Masking usa uma biblioteca de
modelos e regras de formatação, transfor
PDQGRRVGDGRVGHPRGRFRQVLVWHQWHSDUD
PDQWHUDLQWHJULGDGHGDUHIHUrQFLDSDUDDV
DSOLFDo}HV 2V EHQHItFLRV GR 2UDFOH 'DWD
Masking incluem:
8VR OLYUH GH GDGRV GH SURGXomR
HPDPELHQWHVGHQmRSURGXomRVHPYLRODU
DV UHJUDV GH SULYDFLGDGH GRV GDGRV QHP
DUULVFDUVH D YD]DPHQWR GH GDGRV FRQ¿
denciais.
Os administradores da segurança
GH¿QHP XPD YH] DV UHJUDV GH PDVFDUD
PHQWR TXH VmR HQWmR DXWRPDWLFDPHQWH
DSOLFDGDV FDGD YH] TXH R DGPLQLVWUDGRU
de banco de dados mascara o banco de
dados. A descaracterização de dados con
¿GHQFLDLVHVWiFDGDYH]PDLVVHQGRUHFR
nhecida como tecnologia fundamental nas
OHLV GH SURWHomR GH SULYDFLGDGH GH GDGRV
HPWRGRRPXQGR>25$&/(@
HOHYDGR LPSOHPHQWDQGR QRV PRGHORV GH
EODFNOLVWZKLWHOLVWSURWHJHQGRGHDPHDoDV
VHP FRQVXPR GH WHPSR D JHULU RV IDOVRV
SRVLWLYRV WDPEpP SRVVLELOLWD DV RUJDQL]D
o}HV D HQGHUHoDU UHTXLVLWRV GH FRQIRUPL
dade.
'DWDEDVH )LUHZDOO SRVVXL DOJX
mas caracteristicas, são elas: Modelos de
LPSOHPHQWDomR ÀH[tYHLV TXH LQFOXHP PR
QLWRUL]DomRHEORTXHLRSROtWLFDVEDVHDGDV
HPEODFNOLVWZKLWHOLVWHOLVWDVGHH[FHSo}HV
D DFHVVRV RX PHVPR D XVXiULRV DUTXL
WHFWXUD DOWDPHQWH HVFDOiYHO SDUD DSOLFD
o}HV HPSUHVDULDLV GH]HQDV GH UHODWyULRV
GH FRQIRUPLGDGH LQWHJUDGRV H SHUVRQDOL
]iYHLVSHUPLWLQGRTXHDVRUJDQL]Do}HVVH
HQTXDGUHPDVQRUPDVGHVHJXUDQoDHGH
DXGLWRULDDOHUWDVGHVHJXUDQoDHPWHPSR
real.
2V FRPSRQHQWHV GR 2UDFOH )L
UHZDOO VH FRQVWLWXHP HP WUrV SLODUHV VmR
eles:
2UDFOHGDWDEDVH¿UHZDOOLQWHUUR
JD H DSOLFD D SROtWLFD GH 64/ j EDVH GH
dados.
0DQDJHPHQWVHUYHUJHVWmRFHQ
WUDOL]DGDDOHUWDVHUHODWyULRV
$QDO\]HU $QDOLVD D VHVVmR GH
64/SDUDHVWDEHOHFHUDVOLQKDVGHEDVHGD
SROtWLFD>25$&/(@
Figura 6: Fonte 2UDFOH6HFXULW\
'DWDEDVH)LUHZDOO
22UDFOH)LUHZDOOPRQLWRUDDDFWL
YLGDGHGDEDVHGHGDGRVGHPRGRDSUHYH
nir o acesso não autorizado,
LQMHo}HVQR64/DOWHUDomRGHSUL
YLOpJLRVHRXWURVDWDTXHVH[WHUQRVHLQWHU
QRVWXGRRQOLQHQDEDVHGHGDGRV3HUPL
WLQGRTXHRVDGPLQLVWUDGRUHVPRQLWRUHPH
controlem todos os acessos realizados na
base de dados.
2UDFOH 'DWDEDVH )LUHZDOO RIHUH
FHXPVLVWHPDGHHOHYDGDFDSDFLGDGHGH
HVFDODELOLGDGH DVVHUWLYR H GH UHQGLPHQWR
107
Figura 7:)RQWH2UDFOH)LUHZDOO
6HFXULW\5DGLXV
O Oracle Security Radius fornece
XPFOLHQWH5HPRWR5$',865HPRWH$X
WKHQWLFDWLRQ'LDO,Q8VHU6HUYLFHTXHSHUPL
WHTXHREDQFRGHGDGRVUHVSHLWHDDXWHQWL
FDomRHDVDXWRUL]Do}HVGHFODUDGDVSRUXP
VHUYLGRU2UDFOHSUpFRQ¿JXUDGR
(VVHUHFXUVRpSDUWLFXODUPHQWH~WLO
SDUDHPSUHVDVLQWHUHVVDGDVQDDXWHQWLFD
Interciência
& Sociedade
omR GH GRLV IDWRUHV TXH HVWDEHOHFH VXD
LGHQWLGDGHFRPEDVHQRTXHYRFrVDEHVH
QKDRXLQIRUPDo}HVHQRTXHYRFrWHPR
FDUWmRGHWRNHQRXXPFDUWmRFRPVHQKDV
606 JHUDGRV SHODV DJrQFLDV EDQFDULDV
IRUQHFLGRSRUDOJXQV%DQFRV
5$',86pXPVLVWHPDGLVWULEXtGR
TXHSURWHJHRDFHVVRUHPRWRDVHUYLoRVGH
rede no banco de dados e está consolida
GRFRPRXPSDGUmRQRVHWRUSDUDDFHVVR
remoto e controla os acessos feitos nas
redes. As credenciais de usuário e as in
IRUPDo}HVGHDFHVVRQR5$',86VmRGH¿
QLGDVQRVHUYLGRU2UDFOHSDUDSHUPLWLUTXH
XPVHUYLGRUH[WHUQRUHDOL]HRVVHUYLoRVGH
autenticação, autorização e contabilidade
TXDQGRVROLFLWDGRV
2VXSRUWHDR5$',86QR2UDFOHp
XPD LPSOHPHQWDomR GRV SURWRFRORV FOLHQ
WHVGR5HPRWH8VHU6HUYLFHTXHSHUPLWHP
TXH R EDQFR GH GDGRV IRUQHoD DXWHQWLFD
omR DXWRUL]DomR H FRQ¿DELOLGDGH D XVXi
ULRVQR%'%DQFRGH'DGRV
2VHUYLoRHQYLDVROLFLWDo}HVGHDX
WHQWLFDomRDRVHUYLGRUHDWXDFRQIRUPHDV
UHVSRVWDV GR EDQFR$ DXWHQWLFDomR SRGH
RFRUUHUHPPRGRGHDXWHQWLFDomRVtQFURQR
RXDVVtQFURQRHID]SDUWHGDFRQ¿JXUDomR
GR2UDFOHSDUDVXSRUWHDRVGDGRVDORFDGRV
no banco.
2 2UDFOH$GYDQFHG 6HFXULW\ SUR
SRUFLRQD DXWHQWLFDomR UHVSHLWD DXWRUL]D
o}HVDUPD]HQDGDVQR5$',86HVHUYLoRV
básicos de controle de acessos de usuários
GR 5$',86 TXDQGR DFHVVDP R EDQFR GH
dados
2UDFOHYLDVHQKDVRXFULSWRJUD¿DV
OLEHUDGDVSHORVHUYLoR>1(('+$0@
O banco de dados Oracle ofere
FHRVPDLVDYDQoDGRVFRQWUROHVGHDFHVVR
do mercado. A Oracle introduziu recursos
DYDQoDGRV GH FRQWUROH GH DFHVVR FRPR
R %DQFR GH 'DGRV 9LUWXDO 3DUWLFXODU H R
2UDFOH/DEHO6HFXULW\2FXPSULPHQWRGRV
ULJRURVRVUHTXLVLWRVGHFRQWUROHLQWHUQRHQ
FRQWUDGRV QRV UHJXODPHQWRV H[LJH R FRQ
WUROHGHDFHVVRDEDQFRVGHGDGRVDSOLFD
o}HVHGDGRVGHGHQWURGREDQFRGHGDGRV
FRPSOHPHQWDQGRDLPSRVLomRH[LVWHQWHQR
QtYHOGDDSOLFDomR
O Oracle oferece controles de se
JXUDQoDÀH[tYHLVWUDQVSDUHQWHVHDOWDPHQ
WHDGDSWiYHLVTXHQmRUHTXHUHPPXGDQoDV
QDDSOLFDomR2VXVXiULRVSULYLOHJLDGRVSR
GHP VHU LPSHGLGRV GH DFHVVDU GDGRV GD
DSOLFDomRHDVHSDUDomRGHUHVSRQVDELOL
GDGHV SRGH VHU DSOLFDGD DRV DGPLQLVWUD
GRUHV GH EDQFR GH GDGRV H[LVWHQWHV VHP
D QHFHVVLGDGH GH XP SURFHGLPHQWR FDUR
H GHPRUDGR GH GH¿QLomR GH SULYLOpJLR Pt
nimo. O Oracle utiliza inúmeros controles
WpFQLFRV GH DFHVVR HP WHPSR UHDO SDUD
DWLQJLUHVVHVQtYHLVGHSURWHomR
,PSHGH TXH XVXiULRV DOWDPHQWH
SULYLOHJLDGRVDFHVVHPGDGRVGDDSOLFDomR
$XWRUL]DomR GH YiULRV IDWRUHV FULD FDPL
QKRV FRQ¿iYHLV SDUD RV GDGRV GH¿QLQGR
SRUTXHPTXDQGRRQGHHFRPRDVDSOLFD
o}HVGDGRVHEDQFRVGHGDGRVVmRDFHV
sados.
5HJUDV GH FRPDQGR DSOLFDP DV
SROtWLFDV RSHUDFLRQDLV FRP EDVH QD VHJX
UDQoD GH 7,7HFQRORJLD GD ,QIRUPDomR H
HPUHFRPHQGDo}HVGHDXGLWRULDLQWHUQDRX
H[WHUQD>*5$d$',2@
6. CONSIDERAÇÕES FINAIS
Figura 8: )RQWH2UDFOH$GYDQFHG6HFXULW\
&RQWUROHGH$FHVVRQR2UDFOH*
108
6HQGR DVVLP FRQFOXtPRV TXH
DSyVRHVWXGRUHDOL]DGRGHVFREULPRVTXH
QRV ~OWLPRV DQRV RFRUUHUDP GLYHUVRV LQFL
dentes de roubo de identidade e fraudes de
LQIRUPDo}HV D EDQFR GH GDGRV HP YiULDV
LQVWLWXLo}HVFRPLVVRDHPSUHVD2UDFOHWHP
EXVFDGRLQYHVWLUHPVHJXUDQoDDYDQoDGD
1HVVHHVWXGRIRLWUDWDGDDYHUVmR
2UDFOH * UHOHDVH YHUVmR GLVSRQLELOL
]DGDSHOD2UDFOHTXHIRLGHVHQYROYLGRHP
FRP PDLV GH UHFXUVRV PL
OK}HVGHKRUDVGHWHVWHVHSHVVRD
PHVHVGHGHVHQYROYLPHQWR
Interciência
& Sociedade
$2UDFOHSURSRUFLRQDXPDVHJX
UDQoDWUDQVSDUHQWHDVHXVXVXiULRVEDVH
DGD HP SDGU}HV GH EDQFR GH GDGRV TXH
SURWHJH DV LQIRUPDo}HV SRU PHLR GH FULS
WRJUD¿DDUPD]HQDQGRGDGRVDORFDGRVHP
VHXEDQFRWUDWDQGRDUTXLYRVDUPD]HQDGRV
FRP VHUYLoRV GH DXWHQWLFDomR IRUWH DP
SOLDQGR D HVWUXWXUD GH VHJXUDQoD H[LVWHQ
WHQDVHPSUHVDVRXVHMDWRGRDFHVVRDR
EDQFRGHGDGRVUHTXHUDXWHQWLFDomRXVXi
ULDRXGHDSOLFDo}HV
7. TRABALHOS FUTUROS
2 WUDEDOKR SURSRVWR IRL XP OHYDQWD
PHQWR %LEOLRJUi¿FR SRUWDQWR VXJHULPRV FRPR
WUDEDOKR IXWXURV D LPSOHPHQWDomR H DYDOLDomR
da segurança do Banco de Dados Oracle 11G
5HOHDVH
REFERÊNCIAS BIBLIOGRÁFICAS
%(518&, 7K\DJR Novidades para desenvolvedores no Oracle 11g GLVSRQtYHO HP KWWSZZZ
GHYPHGLDFRPEUQRYLGDGHV SDUDGHVHQYROYHGRUHV
QRRUDFOHJUHYLVWDVTO
PDJD]LQHSDUWH
L[]]D[-L.)Y!
$FHVVRHPGH$JRVWR
NEEDHAM, Paul. Oracle Advanced SecurityGLVSR
QtYHO HP KWWSZZZRUDFOHFRPWHFKQHWZRUNGDWD
EDVHRSWLRQVDGYDQFHGVHFXULW\LQGH[KWPO!
$FHVVRHPGH0DLR
NEEDHAM, Paul. Oracle Database Vault GLVSRQtYHO
HP KWWSZZZRUDFOHFRPWHFKQHWZRUNHQGDWDED
VHHQWHUSULVHGLWLRQVHJXUDQ&$D FRQIRUPLGD
GHGDWDEDVHJSWESGI!$FHVVRHPGH
6HWHPEUR
NEEDHAM, Paul. Oracle Security Radius GLVSRQt
YHOHPKWWSZZZRUDFOHFRPWHFKQHWZRUNGDWDED
VHVHFXULW\!$FHVVRHPGH$JRVWR
ORACLE. A História da Oracle e Versões existentes GLVSRQtYHOHPKWWSZZZRUDFOHFRPEUFRUSR
UDWHSUHVVVWRU\SWEKWPO!$FHVVRHPGH
-XQKR
25$&/( &RUSRUDWLRQ Oracle Advanced Security
Encryption GLVSRQtYHO HP KWWSZZZRUDFOHFRP
WHFKQHWZRUNGDWDEDVHVHFXULW\RZSVHFXULW\GDWD
EDVHJUSGI !$FHVVR HP GH -XQKR
5$0(= (OPDVUL 1$9$7+( 6% Sistemas de
Banco de Dados±3HDUVRQ$GGLVRQ:HVOH\
25$&/( &RUSRUDWLRQ Oracle Database Firewall
GLVSRQtYHO HP KWWSZZZRUDFOHFRPWHFKQHWZRUN
SURGXFWVGDWDEDVH¿UHZDOOLQGH[KWPO! $FHVVR HP
GH-XOKR
)5((0$1 * 5REHUW 3$&. &KDUOHV 67816
'RXJ %87(5%$8*+ 7LP Oracle Database 11G
$GPLQLVWUDWRU &HUWL¿HG 3UR¿VVLRQDO :LOH\ 3X
EOLVKLQJ,QF
81,&$03 %DQFRV GH 'DGRV Conceito de Segurança de Banco de dados GLVSRQtYHO HP KWWS
XQLFDPSEUSXEDSRLRWUHLQDPHQWRVEDQFRGDGRVFXU
VRGESGI!$FHVVRHPGH-XQKR
)857$'2$ / 6$1726 & 6 Organização de
Banco de Dados (G 5LR GH -DQHLUR &DPSXV
81,&$036HJXUDQoDHP7HFQRORJLDGD,QIRUPDomR
Conceito Segurança Tecnologia da Informação
GLVSRQtYHO HP +WWSXQLFDPSEUSXEDSRLRWUHLQD
PHQWRV6HJXUDQFDVHJSGI!$FHVVRHPGH-XQKR
*5$d$',2 0DUFHOR 0RUHLUD Controle de acesso Oracle Database GLVSRQtYHO HP KWWSZZZ
GHYPHGLDFRPEUXSJUDGHSDUDR RUDFOHGDWDEDVH
SDUDJUHYLVWDVTOPDJD]LQH ! $FHVVR
HPGH$JRVWR
,'&:RUOG:LOGHPesquisa de Mercado Bancos de
dados 0XQGR GLVSRQtYHO HP KWWSZZZLGFFRP
SURGVHUYSURGVHUYMVS"W ! $FHVVR
HPGH-XQKR
109
,03$&7$ *UXSR Pesquisa de Mercado Bancos
de dados BrasilGLVSRQtYHOHPKWWSZZZLPSDF
WDFRPEUDLPSDFWDSGIVEDQFRGDGRV!$FHVVRHP
GH-XQKR
:$+/3HWHUData Masking OracleGLVSRQtYHOHP
KWWSZZZRUDFOHFRPVHFXULW\GDWDEDVHGDWDPDVNL
VHFXULW\LQGH[KWPO!$FHVVRHPGHMXOKR
:$+/3HWHUSecurity and ComplianceGLVSRQtYHO
HP KWWSZZZRUDFOHFRPWHFKQHWZRUNGDWDEDVH
VHFXULW\LQGH[KWPO!$FHVVRHPGH-XQKR
Interciência
& Sociedade
Luiz Antonio Sacco pDOXQRGRFXUVRGH&LrQFLDGD&RPSXWDomRGD)DFXOGDGH0XQLFLSDO3URIHVVRU)UDQFR
0RQWRUR±)03)0$WXDOPHQWHp$QDOLVWDGH6LVWHPDVQDHPSUHVD7HQQHFR$XWRPRWLYH%UDVLO/WGDHP0RJL
Mirim SP.
Patrícia Aparecida Zibordi Aceti SRVVXLJUDGXDomRHP7HFQRORJLDHP3URFHVVDPHQWRGH'DGRVSHOD)XQ
GDomR3LQKDOHQVHGH(QVLQR(VSHFLDOLVWDHP$QiOLVHGH6LVWHPDVSHOD3RQWLItFLD8QLYHUVLGDGH&DWyOLFDGH
&DPSLQDV0HVWUHHP6LVWHPDVGH,QIRUPDomRSHOD3RQWLItFLD8QLYHUVLGDGH&DWyOLFDGH&DPSLQDV0HVWUHHP
(QJHQKDULDGH3URGXomRSHOD8QLYHUVLGDGH0HWRGLVWDGH3LUDFLFDED81,&$03$WXDFRPRSURIHVVRUDXQLYHUVL
WiULDGHVGHp&RRUGHQDGRUDGR&HQWUR5HJLRQDO8QLYHUVLWiULRGH(VStULWR6DQWRGR3LQKDO(VStULWR6DQWR
GR3LQKDO±63HSURIHVVRUDGD)DFXOGDGH0XQLFLSDO3URIHVVRU)UDQFR0RQWRURÈUHDVGHLQWHUHVVHHPSHVTXL
VD$OJRULWPRVFRPSOH[RVHGHVHQYROYLPHQWRGHSURJUDPDVHVLVWHPDVGHFRPSXWDomR
110
Interciência
& Sociedade
Download

estudar os pontos fortes da segurança do banco de dados