Privileged Access Control Foundations

  • Paul Wright


The next three chapters are about privileged access control (PAC) applied to Oracle RDBMS. This chapter will outline the theoretical foundations underpinning PAC, as well as the business drivers justifying PAC projects. Practical implementations will be described in Chapter 13. Chapter 13 will also demonstrate generic security weaknesses of privileged access control implementations, before moving onto Chapter 14 and solutions for securing PAC installs.


Access Control Security Control Inside Attack Grant Option Insider Threat 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Paul Wright 2014

Authors and Affiliations

  • Paul Wright
    • 1
  1. 1.SurreyUK

Personalised recommendations