Sie sind auf Seite 1von 11

O ESTUDO DOS PONTOS FORTES DA SEGURANA DO BANCO DE

DADOS ORACLE 11G RELEASE 2


SACCO, Luiz Antonio
)DFXOGDGH0XQLFLSDO3URIHVVRU)UDQFR0RQWRUR )03)0
OXL]DQWRQLRVDFFR#JPDLOFRP
$&(7,3DWUtFLD$SDUHFLGD=LERUGL
)DFXOGDGH0XQLFLSDO3URI)UDQFR0RQWRUR )03)0
SDWULFLD]LERUGL#XROFRPEU

RESUMO: 2REMHWLYRGHVWHDUWLJRpHVWXGDURVSRQWRVIRUWHVGDVHJXUDQoDGREDQFRGHGDGRV2UDFOH
*HPVXDYHUVmRPDLVUHFHQWH2EDQFRGHGDGRV2UDFOHIRLHVFROKLGDSDUDHVWHHVWXGRGHYLGR
DVHUSDUWHGRSRUWIyOLRGHVROXo}HVSDUDXPDJUDQGHTXDQWLGDGHGHHPSUHVDV$2UDFOHpDSULPHLUD
HPSUHVDDGHVHQYROYHUHLPSODQWDUGHVHXVVRIWZDUHVSDUDLQWHUQHWFRPRSURGXWRVGHEDQFRGH
GDGRVDSOLFDo}HVGHQHJyFLRVHGHVHQYROYLPHQWRGHDSOLFDo}HV2EDQFRGHGDGRV2UDFOHpXPGRV
EDQFRVGHGDGRVPDLVFRJLWDGRVGHYLGRjVHJXUDQoDSURWHomRGHGDGRVFDSDFLGDGHGHDXGLWRULDH
UHFXSHUDomRGHGDGRVFRPSOHWR(OHWHPXPDLQWHUIDFHDPLJiYHOSDUDWUDEDOKDUHSRGHVHUDSOLFDGR
HPGLIHUHQWHVPHUFDGRV(OHpHTXLSDGRGHFDUDFWHUtVWLFDVGHHOLPLQDomRGHUHGXQGkQFLDRFLRVRTXH
SHUPLWHXPUiSLGRWUiIHJRGHGDGRVQDUHGHHPDLVLPSRUWDQWHFRPPXLWDVHJXUDQoD
PALAVRAS-CHAVE: Oracle, Banco de Dados, Segurana e SGBD.

ABSTRACT: The objective of this article it to study the strengths of security from Oracle Database
11G, in its more recent version. The Oracle Database was chosen for this study due to be part of the
SRUWIROLRRIVROXWLRQVIRUDODUJHTXDQWLW\RIFRPSDQLHV7KH2UDFOHLVWKHUVWFRPSDQ\WRGHYHORSDQG
deploy 100% of its sofwares for internet, as database products, business applications and development
of applications. The Oracle DB is one of most bandied databases due to the security, protection of data,
ability to audit and full data recovery. It has a friendly user interface to work and can be applied in diffeUHQWPDUNHWV,WLVSURYLGHGRIHOLPLQDWLRQLGOHUHGXQGDQF\IHDWXUHVDOORZLQJDTXLFNO\WUDIFRIWKHGDWD
on the network and, most important, very safely.
KEYWORDS: Oracle, Database, Security and SGBD.

1. INTRODUO
1.1. Conceito de Banco de dados
8P EDQFR GH GDGRV p XPD  FROH
omR GH GDGRV UHODFLRQDGRV  SRVVXLQGR DV
VHJXLQWHVSURSULHGDGHVLPSOtFLWDV
 5HSUHVHQWD DOJXP DVSHFWR  GR
PXQGR UHDO PLQLPXQGR RX XQLYHUVR  GH
GLVFXUVR 
 e XPD FROHomR GH GDGRV  ORJL
FDPHQWHFRHUHQWHVHTXHSRVVXHPDOJXP
VLJQLFDGRLQHUHQWH
 e SURMHWDGR FRQVWUXtGR H  LQV
WDQFLDGR SRYRDGR  SDUD XPD  DSOLFDomR
HVSHFtFD
>5$0(=@
8P%DQFRGH'DGRVpXPDFROH

100

o logicamente coerente de dados com


XP GHWHUPLQDGR VLJQLFDGR  LQHUHQWH ,VWR
VLJQLFDTXHXPFRQMXQWRDOHDWyULRGHGD
GRV QmR SRGH VHU  FRQVLGHUDGD XP %DQFR
de Dados.
8P%DQFRGH'DGRVpSURMHWDGR
FRQVWUXtGRHFRPSRVWRSRUXPFRQMXQWRGH
GDGRVSDUDXPSURSyVLWRHVSHFtFR([LVWH
XP JUXSR  GH XVXiULRV RX DOJXPDV DSOLFD
o}HVSUpFRQFHELGDVRQGHHVWHVGDGRVVH
ro utilizados.
8P %DQFR GH 'DGRV  UHSUHVHQWD
DVSHFWRV GH XPD SDUWH  UHVWULWD GR PXQGR
real, denominado de PLQLPXQGR$OWHUDo}HV
TXH RFRUUD QR  PLQLPXQGR VmR UHHWLGDV QR
Banco de Dados.

Resumindo, um Banco de Dados


UHSUHVHQWDXPDIRQWHGHRQGHLQIRUPDo}HV
Intercincia
& Sociedade

VmR GHULYDGDV SRVVXL XP  QtYHO GH LQWHUD


omR FRP HYHQWRV TXH  RFRUUHP QR PXQGR
UHDOHXPDDXGLrQFLDTXHHVWiLQWHUHVVDGD
em seu contedo.
>)857$'2@
(VWXGRGH0HUFDGR
8PDEUHYHSHVTXLVDFRPRVEDQ
FRV GH GDGRV XWLOL]DGRV QDV  HPSUHVDV QR
Brasil e no Mundo.

Figura 1: Bancos de dados utilizados nas or


JDQL]Do}HV QR %UDVLO )RQWH *UXSR  ,PSDFWD
 

SULYDFLGDGHVmRDVJDUDQWLDVGHTXHRVGD
GRVVyVHUmRDFHVVDGRVVRPHQWHSRUSHV
soas autorizadas.
,QWHJULGDGHJDUDQWHTXHXPDPHQ
VDJHP GDGRHPDLODUTXLYRHWF QmRIRL
DOWHUDGRVHPDXWRUL]DomRVHUtQWHJURPDQ
WHUVHRPHVPR
2FRQFHLWRGH6HJXUDQoDHP7,RX
6HJXUDQoDGH&RPSXWDGRUHVHVWiUHODFLR
QDGRFRPRGH6HJXUDQoDGD,QIRUPDomR
LQFOXLQGRQmRDSHQDVDVHJXUDQoDGRVGD
GRVLQIRUPDomRPDVWDPEpPDGRVVLVWH
mas em si.
Atualmente o conceito de Segu
UDQoDGD,QIRUPDomRHVWiSDGURQL]DGRSHOD
QRUPD ,62,(&   LQXHQFLDGD
SHOR SDGUmR  LQJOrV %ULWLVK 6WDQGDUG  %6
$VpULHGHQRUPDV,62,(&IRL
UHVHUYDGDSDUDWUDWDUGHSDGU}HVGH6HJX
UDQoD GD ,QIRUPDomR LQFOXLQGR D  FRPSOH
PHQWDomR DR WUDEDOKR RULJLQDO  GR SDGUmR
ingls.
A segurana da informao est
UHODFLRQDGDFRPSURWHomRGHXPFRQMXQWR
GHGDGRVQRVHQWLGRGHSUHVHUYDURYDORU
TXHSRVVXHPSDUDXPLQGLYtGXRRXXPDRU
ganizao.
>81,&$03@
 &RQFHLWR EiVLFR GH  6HJXUDQoD HP
Banco de dados

Figura 2: Bancos de Dados utilizados nas or


JDQL]Do}HVQR0XQGR )RQWH,'&:RUOG:LOGH
 

2. Conceitos de Segurana
&RQFHLWRGH6HJXUDQoDHP7HFQRORJLD
GD,QIRUPDomR
&RQFHLWRGHVHJXUDQoDGH7,HVWi
LQWLPDPHQWH OLJDGR FRP SURWHomR  GH XP
FRQMXQWR GH GDGRV QR VHQWLGR  GH SUHVHU
YDURYDORUTXHSRVVXHPSDUDXPLQGLYtGXR
RXXPDRUJDQL]DomRDFRQGHQFLDOLGDGHRX

101

Os bancos de dados de uma em


SUHVD FRQWrP XPD JUDQGH  TXDQWLGDGH GH
dados e geralmente um grande nmero de
usurios. A maioria destes usurios no
tem a necessidade de acessar todos os
GDGRV$VVLPSHUPLWLURDFHVVRLUUHVWULWRD
WRGRV RV  GDGRV SRGH VHU LQGHVHMiYHO H R
6*%' 6LVWHPDJHUHQFLDGRUGH%DQFRGH
'DGRV GHYHSURYHUPHFDQLVPRVSDUDFRQ
WURODU HVWH DFHVVR VHQGR SRU  XVXiULRV RX
PHVPR HP DSOLFDo}HV TXH  HVWDUmR DFHV
sando os dados.
$WUDYpVGRFRQWUROHGHDFHVVRGLV
FULFLRQiULR FDWiORJRV  R EDQFR GH  GDGRV
PDQWpPXPUHJLVWURGRVVHXVREMHWRVHGRV
SULYLOpJLRV TXH FDGD  XVXiULR RX JUXSR GH
XVXiULRV SRVVXL  VREUH RV GDGRV DORFDGRV
no banco de dados.
&RQWUROH GH DFHVVR 6*%'V 6LV
WHPD JHUHQFLDGRU  GH %DQFR GH 'DGRV 
FRQWURODPRDFHVVRDRVGDGRVDWUDYpVGR

Intercincia
& Sociedade

controle de acesso discricionrio. Esse


FRQWUROH  p EDVHDGR QR FRQFHLWR GH GLUHL
WRV GH  DFHVVR RX SULYLOpJLRV H D PDQHLUD
GHFRQFHGHUHVWHVSULYLOpJLRVDRVXVXiULRV
8PSULYLOpJLRSHUPLWHTXHXPXVXiULRDFHV
VHRGDGRGHFHUWDPDQHLUD SRUH[HPSOR
OHQGRRXDOWHUDQGRRVGDGRV 
8PXVXiULRTXHFULDXPREMHWRDX
WRPDWLFDPHQWH DGTXLUH WRGRV RV  GLUHLWRV
VREUHRPHVPR$SDUWLUGHHQWmRREDQFR
GH GDGRV JXDUGD WRGRV  RV SULYLOpJLRV TXH
so concedidos a outros usurios e des
WD IRUPD JDUDQWH  TXH DSHQDV RV XVXiULRV
DXWRUL]DGRVSRVVDPDFHVVDUHVWHVREMHWRV
(PSUDWLFDPHQWHWRGRVRVEDQFRV
de dados, o controle de acesso discricio
QiULR p LPSOHPHQWDGR DWUDYpV  GR XVR GRV
FRPDQGRV*5$17H5(92.(2FRPDQ
GR *5$17  FRQFHGH SULYLOpJLRV VREUH RV
REMHWRV GR  EDQFR GH GDGRV WDEHODV H YL
V}HVGHQWUHRXWURV DRXWURVXVXiULRVHQ
TXDQWR TXH R FRPDQGR 5(92.(  UHYRJD
RVSULYLOpJLRVFRQFHGLGRV3DUDXPPHOKRU
entendimento do mecanismo de acesso
GLVFULFLRQiULRpLPSRUWDQWHFRPSUHHQGHUD
GHQLomRGHSULYLOpJLRVREMHWRVHXVXiULRV
8VXiULRVVmRDVSHVVRDVTXHHV
WmR UHSUHVHQWDGDV SRU XP QRPH GH  DXWR
UL]DomR 2V XVXiULRV SRGHP VHU  FODVVL
FDGRVHPJUXSRVGHDFRUGRFRPXPSHUO
RX QtYHO GH DXWRUL]DomR 8P  XVXiULR TXH
SHUWHQFHDXPJUXSRLPSOLFLWDPHQWHUHFH
EHRVSULYLOpJLRVUHODFLRQDGRVDRJUXSRTXH
HOHSHUWHQFH
3ULYLOpJLR 'HQH XPD  SHUPLVVmR
LQGLYLGXDO DVVRFLDGD D XP  QRPH DXWRUL]D
GRKDELOLWDQGRRDDFHVVDURXPRGLFDUXP
UHFXUVRGREDQFRGHGDGRV2VSULYLOpJLRV
WDPEpP  SRGHP VHU FRQFHGLGRV D JUXSRV
GH  XVXiULRV RX PHVPR D DSOLFDo}HV TXH
H[HFXWDPFRPDQGRVQREDQFR
Objetos: os usurios necessitam
GHSULYLOpJLRVSDUDDFHVVDURVREMHWRVJXDU
GDGRV QR EDQFR GH  GDGRV 2V SULYLOpJLRV
YDULDP GH DFRUGR  FRP D QDWXUH]D GR RE
MHWR3RUH[HPSORXPDWDEHODSRVVXLXPD
OLVWDGHSULYLOpJLRVGLIHUHQWHGDVYLV}HVVmR
HODVWDEHODVYLV}HVtQGLFHVWULJJHUVHQWUH
RXWURV>81,&$03@
3. Histria Oracle
2 %DQFR GH GDGRV 2UDFOH p  XP

102

6*%' 6LVWHPD JHUHQFLDGRU GH  %DQFR


GH 'DGRV  TXH VXUJLX QR P GRV  DQRV
 TXDQGR /DUU\ (OOLVRQ  YLVOXPEURX XPD
RSRUWXQLGDGH TXH  RXWUDV FRPSDQKLDV QmR
KDYLDPSHUFHELGRTXDQGRHQFRQWURXXPD
GHVFULomRGHXPSURWyWLSRIXQFLRQDOGHXP
%DQFRGH'DGRVUHODFLRQDOHGHVFREULXTXH
QHQKXPDHPSUHVDWLQKDVHHPSHQKDGRHP
comercializar essa tecnologia.
(OOLVRQHRVFRIXQGDGRUHVGD2UD
FOH&RUSRUDWLRQ%RE0LQHUH(G2DWHVSHU
FHEHUDPTXHKDYLDXPWUHPHQGRSRWHQFLDO
GH QHJyFLRV QR  PRGHOR GH EDQFR GH GD
dos relacional tornando assim a maior em
SUHVDGHVRIWZDUHHPSUHVDULDOGRPXQGR
26*%'GD2UDFOHpOtGHUGHPHUFDGR2
2UDFOHLIRLSLRQHLURQRVXSRUWHDRPRGHOR
ZHE22UDFOHJPDLVUHFHQWHVHEDVHLD
na tecnologia de grid. Recentemente fora
ODQoDGRR2UDFOHJTXHYHLRFRPPHOKR
ULDVHPUHODomRDR2UDFOHJ
$OpPGD%DVHGH'DGRVD2UDFOH
GHVHQYROYHXPDVXtWHGHGHVHQYROYLPHQWR
FKDPDGDGH2UDFOH'HYHORSHU6XLWHXWLOL
]DGDQDFRQVWUXomRGHSURJUDPDVGHFRP
SXWDGRUTXHLQWHUDJHPFRPDVXDEDVHGH
GDGRV$2UDFOHWDPEpPFULRXDOLQJXDJHP
GHSURJUDPDomR3/64/XWLOL]DGDQRSUR
FHVVDPHQWRGHWUDQVDo}HV
2 %DQFR GH GDGRV 2UDFOH p  GH
VHQYROYLGRHP129$<25.(8$HDWXDO
PHQWH D XOWLPD YHUVmR p D J  UHOHDVH 
IRLGHVHQYROYLGRHP2UDFOHFRQWLQXD
FRPDYHUVmRGR2UDFOHJpD~OWLPDQR
PRPHQWRHDLQGDHVWipDYHUVmRGR%DQFR
de
'DGRV PDLV SRSXODU GR PXQGR
&RPPDLVGHUHFXUVRVPLOK}HVGH
KRUDVGHWHVWHVHSHVVRDPHVHVGH
GHVHQYROYLPHQWR R  EDQFR GH GDGRV 2UD
FOH J GHVWDFDVH  FRPR R VRIWZDUH PDLV
LQRYDGRUHGHPDLVDOWDTXDOLGDGHMiODQoD
GRSHOD2UDFOH2EDQFRGHGDGRV2UDFOH
JFRQVWUXtGRFRPDQRVGHH[SHULrQ
cia em design, oferece recursos de ltima
JHUDomR SDUD JHUHQFLDPHQWR GH  LQIRUPD
o}HVHPSUHVDULDLVDUPD$QG\0HQGHOVR
KQ YLFHSUHVLGHQWH VrQLRU GH  7HFQRORJLDV
GH6HUYLGRUGH%DQFRGH'DGRVGD2UDFOH
0DLV GR TXH QXQFD  QRVVRV FOLHQWHV HQ
IUHQWDPGHVDRVWDLVFRPRUiSLGRFUHVFL
mento dos dados, aumento da integrao
HQWUHHOHVHSUHVV}HVQRFXVWRGDWHFQROR

Intercincia
& Sociedade

JLDSDUDFRQHFWLYLGDGH2%DQFRGH'DGRV
2UDFOHJIRLSLRQHLURHPJULGFRPSXWLQJH
mais da metade dos clientes Oracle migra
UDPSDUDHVVDYHUVmR$JRUDR%DQFRGH
'DGRV2UDFOHJRIHUHFHRVUHFXUVRVTXH
VROLFLWDUDP SDUD DFHOHUDU D DPSOD  DGRomR
HFUHVFLPHQWRGRVJULGV2UDFOHUHSUHVHQ
WDQGRXPDLQRYDomRUHDOTXHVHYROWDSDUD
GHVDRVUHDLVWUD]LGRVDWpQyVSRUFOLHQWHV
UHDLVFRPSOHWD
Com o Banco de Dados Oracle
J DV RUJDQL]Do}HV SRGHUmR DVVXPLU  R
FRQWUROH GH VXDV LQIRUPDo}HV  HPSUHVD
ULDLVWHUHPXPDPHOKRUYLVmRGRVQHJyFLRV
H DGDSWDUVH FRP UDSLGH]  D XP DPELHQWH
FRPSHWLWLYRTXHSDVVDSRUJUDQGHVPXGDQ
as.
$QRYDYHUVmRDXPHQWDDFDSDFL
GDGHGH&OXVWHUGH%DQFRGH'DGRVDOpP
GH DFHOHUDU D DXWRPDomR  GR 'DWD&HQWHU
e o gerenciamento da carga de trabalho.
&RPJULGVVHJXURVDOWDPHQWHGLVSRQtYHLV
H HVFDOiYHLV GH  VHUYLGRUHV H DUPD]HQD
PHQWR GH EDL[R  FXVWR RV FOLHQWHV 2UDFOH
WrP VXSRUWH  SDUD DV DSOLFDo}HV PDLV H[L
JHQWHV GH  SURFHVVDPHQWR GH WUDQVDo}HV
GDWD  ZDUHKRXVLQJ H JHVWmR GH FRQWH~GR
>25$&/(@
 9HUV}HV ([LVWHQWHV GR %DQFR  GH 'D
dos Oracle

103

Fonte: 2UDFOH

4. Vantagens e desvantagens do Oracle


11G
9DQWDJHQV
*UDQGHFDSDFLGDGHGHSHUIRUPDQ
FHSDUDGDGRVHPJUDQGHVTXDQWLGDGHV
Segurana nos dados, fornece
XPDVROXomRGHFULSWRJUDDPXLWRDYDQoD
GDSDUDRPHUFDGRGHQWURGHXPEDQFRGH
dados.
Possui controle de acesso, sendo
QHFHVViULR TXH R XVXiULR SUHFLVH  VHU DX
WHQWLFDGRSDUDTXDOTXHUDFHVVRDR%DQFR
PHVPR TXH VHMD SDUD XP  6HOHFW VHQGR
HVWH FRQWUROH SRU  FDPDGDV RX VHMD XP
XVXiULR SRGH WHU  DFHVVR DSHQDV D XPD
tabela ou mesmo a uma coluna dentro de
uma tabela.
1mRSHUPLWHTXHRVGDGRVVHMDP
H[SRUWDGRVHPDUTXLYRVVLPSOHV
SURSRUFLRQDQGR XPD FRQDELOLGD
de nos dados do banco de dados Oracle
TXDQGRVmRVDOYRVHWUDQVSRUWDGRV
3RVVXL R $GYDQFHG 6HFXULW\  TXH
SURWHJH D FRQGHQFLDOLGDGH H  LQWHJULGDGH
GRVGDGRVSDUDTXHSRVVDPWUDIHJDUSHOD
UHGHXVDQGRFULSWRJUDD
3RVVXLR2UDFOH'DWDEDVH)LUHZDOO
pXPDOLQKDGHGHIHVDSDUDEDQFRVGHGD
GRVIRUQHFHQGRPRQLWRUDPHQWRHPWHPSR
UHDO GD  DWLYLGDGH GR EDQFR GH GDGRV QD
UHGH  QmR SHUPLWLQGR TXH SURJUDPDV QHP
XVXiULRVFRQVLJDPDFHVVDURXYLVXDOL]DURV
GDGRVVHPDXWHQWLFDomRQREDQFRTXDQGR
os dados so trafegados.
2IHUHFHXPDVROXomRSDUDDSOLFD
omRGHTXDOTXHUFRUUHomRHPVHXDPELHQWH
incluindo seu ncleo, sem necessidade de
UHLQtFLRGRVHUYLoR,VWRIDFLOLWDPDQXWHQomR
ou mesmo ajustes urgentes em ambiente
GHSURGXomRSRLVHPDPELHQWHVFUtWLFRVp
FDGD YH]  PDLV UDUR FRQVHJXLUVH XPD MD
QHODGHLQGLVSRQLELOLGDGHSDUDHVWHWLSRGH
Intercincia
& Sociedade

FRUUHomR>)5((0$1@
'HVYDQWDJHQV
Alto Custo da Licena do banco de
GDGRV H GR KDUGZDUH RQGH R  EDQFR HVWi
alocado.
([LJHHVSHFLDOL]DomRWpFQLFDVHMD
SDUDDGPLQLVWUDomRGREDQFR
7DUHIDV FRPR EDFNXSUHFRYHU\
WXQQLQJ PRQLWRUDPHQWR GRV VHUYLoRV  GH
segurana, gerenciamento de acessos de
XVXiULRV 1mR SHUPLWH D  UHFXSHUDomR GH
GDGRVHPXPSRQWRGRWHPSRGHWHUPLQDGR
RVGDGRVVySRGHPVHUUHVWDXUDGRVSDUDR
PRPHQWRRQGHR%DFNXSIRLUHDOL]DGR

No so necessrios triggers de
EDQFRGHGDGRVYLVXDOL]Do}HVQHPRXWUDV
DOWHUDo}HVGHDSOLFDWLYRV2$GYDQFHG6H
FXULW\(QFU\SWLRQFULSWRJUDIDRVGDGRVDXWR
PDWLFDPHQWHDQWHVGHOHVVHUHPJUDYDGRV
HPGLVFRHGHFRGLFDRVGDGRVDQWHVGHOHV
VHUHPUHWRUQDGRVDRDSOLFDWLYR2SURFHVVR
GHFULSWRJUDDHGHFRGLFDomRpFRPSOH
WDPHQWHVHJXURDDSOLFDWLYRVHDXVXiULRV
3RUWDQWRRXVXiULRRXDDSOLFDomR
SUHFLVDP VHU DXWHQWLFDGRV  SDUD TXDOTXHU
DFHVVR DR %DQFR GH  'DGRV PHVPR TXH
VHMDSDUDXP6HOHFW>1(('+$0@

5. Pontos fortes da Segurana do Oracle


Data Basic 11G Release 2
([LVWHP YiULRV SRQWRV IRUWHV  GD
segurana do Banco de Dados Oracle,
DEDL[RVHUmRGHVFULWRVDOJXQV
6HFXULW\(QFU\SWLRQ
A Oracle fornece uma soluo de
FULSWRJUDD PXLWR DYDQoDGD QR  PHUFDGR
GHEDQFRGHGDGRV&ULSWRJUDIDDXWRPDWL
FDPHQWHRVGDGRVJUDYDGRVSDUDRDUPD
zenamento do banco de dados Oracle e
GHVFULSWRJUDID DXWRPDWLFDPHQWH RV  GDGRV
GHSRLVTXHRXVXiULRVROLFLWDQWHRXDSOLFDWL
YRIRLDXWHQWLFDGRQREDQFRGHGDGRV
7RGR SURFHVVR GH FRQWUROH GH
DFHVVRYHULFDHLQFOXLDVDSOLFDo}HVSHOD
'DWDEDVH9DXOW/DEHO6HFXULW\SRLVSRVVXL
XPEDQFRGHGDGRVSULYDGRYLUWXDODJLOL]DQ
GRRSURFHVVR%DFNXSVGREDQFRGHGDGRV
PDQWpPRVGDGRVFRPFULSWRJUDDRXVHMD
ID]REDFNXSGRVGDGRVFRPSURWHomRFRP
LVVRiSURWHomRSDUDDVPtGLDVGHEDFNXS
1mRSHUPLWLQGRTXHRVGDGRVVHMDPH[SRU
WDGRVHPDUTXLYRVVLPSOHVSURSRUFLRQDQ
GRXPDFRQDELOLGDGHQDVLQIRUPDo}HVGR
banco de dados.
2 2UDFOH 6HFXULW\ (QFU\SWLRQ  p
D VROXomR GH FULSWRJUDD PDLV  DYDQoDGD
QR VHWRU 8WLOL]D DOJRULWPRV  GH FULSWRJUDD
SDGUmR H XP  JHUHQFLDPHQWR GH FKDYHV
LQWHJUDGR  SDUD IRUQHFHU XPD FULSWRJUDD
WUDQVSDUHQWHGHGDGRVGHDSOLFDWLYRVFRQ
GHQFLDLV

104

Figura 3: )RQWH2UDFOH6HFXULW\

$GYDQFHG6HFXULW\
&ULSWRJUDDGHGDGRVWUDQVSDUHQ
WH RIHUHFH FULSWRJUDD GH  WDEHODV GH DSOL
FDomR EHP FRPR  FROXQDV GH DSOLFDWLYRV
LQGLYLGXDLVGHDSOLFDWLYRVWDLVFRPRFDUWmR
GHFUpGLWRHQ~PHURVGHVHJXUDQoDVRFLDO
CPF, RG entre outros.
$7'( 7UDQVSDUHQW'DWD(QFU\S
WLRQ  SHUPLWH SURWHJHU HP QtYHO  GH DWULEX
WRLQGLYLGXDORXHPQtYHOGHWRGDDWDEHOD
([HPSORVGHDWULEXWRVLQGLYLGXDLVLQFOXHP
LWHQV FRPR Q~PHURV  GH LGHQWLFDomR 7R
dos os objetos do banco de dados criados
QDQRYDWDEHODVHUmRFRGLFDGRVDXWRPD
WLFDPHQWH  WRGRV RV GDGRV VDOYRV VHUmR
FULSWRJUDIDGRV DSyV D H[HFXomR GR  VFULSW
RXGDIXQomRH[HFXWDGDQREDQFR
8VDU D FULSWRJUDD GH WDEHOD  GD
7'(SDUDFRGLFDUWRGDVDVWDEHODVGRDSOL
FDWLYR SURSRUFLRQD DLQGD PDLV  VHJXUDQoD
e economia de custos. A necessidade de
LGHQWLFDUDWULEXWRVLQGLYLGXDLVTXHQHFHV
VLWDPGHFULSWRJUDDpFRPSOHWDPHQWHHOL
PLQDGD$OpPGLVVRDFULSWRJUDDGDWDEH
ODSURSRUFLRQDDLQGDPDLVVHJXUDQoDSRLV
WRGRVRVWLSRVGHGDGRVVmRVXSRUWDGRVH
QmRKiFXVWRVGHGHVHPSHQKRDVVRFLDGRV

Intercincia
& Sociedade

FRPYDUUHGXUDVFRPSOH[DVGHLQWHUYDORVGH
tQGLFHVHPGDGRVFULSWRJUDIDGRV
4XDQGR RFRUUH R EDFNXS GR  %'
RVDUTXLYRVFRGLFDGRVSHUPDQHFHPFULS
WRJUDIDGRV QDV PtGLDV  GH GHVWLQR SURWH
JHQGR DV LQIRUPDo}HV  PHVPR VH PtGLDV
IRUHPSHUGLGDVRXURXEDGDV
2VEDFNXSVFRGLFDGRVVmRGHFR
GLFDGRVDXWRPDWLFDPHQWHGXUDQWHRSHUD
o}HVGHUHVWDXUDomRHUHFXSHUDomRGR%'
%DQFR GH 'DGRV   GHVGH TXH DV FKDYHV
GH GHFRGLFDomR  H[LJLGDV HVWHMDP GLVSR
QtYHLV $  SURWHomR GRV GDGRV H[SRUWDGRV
GREDQFRGHGDGRV2UDFOHSRGHVHURE
WLGDFRPD7'(HPFRQMXQWRFRPR2UDFOH
'DWD3XPSTXHpXPVHUYLoRGHJHUDomR
GHFKDYHVGHVHJXUDQoDHEDFNXSV3RGH
VHXWLOL]DUFRPRFKDYHGHFULSWRJUDDXPD
FKDYH PHVWUD RX  XPD IUDVH VHQKD FRP R
2UDFOH$GYDQFHG6HFXULW\>25$&/(@

QHFHVVLWDP GH 3.,V  LPSOHPHQWDGRV $


FDGDQRYDYHUVmRGREDQFRGHGDGRVQR
YRVDOJRULWPRVGHFULSWRJUDDVmRLQFOXtGRV
jPHGLGDTXHVmRDSURYDGRVSHORVHWRU$
PDLVUHFHQWHDGLomRpR3DGUmR$YDQoDGR
GH &ULSWRJUDD $(6  XP DOJRULWPR  DSUL
PRUDGRHPVHJXUDQoDHGHVHPSHQKRHP
relao ao DES.
2UDFOH$GYDQFHG(QFU\SWLRQ6HFX
ULW\  1HWZRUN p FRPSOHWDPHQWH VHJXUR Ii
FLO  GH FRQJXUDU H QmR UHTXHU FHUWLFDGRV
; $ OLVWD FRPSOHWD GH DOJRULWPRV  GH
LQWHJULGDGHGHGDGRVHFULSWRJUDDp$(6
HELWV '(6 HFKDYHV
 ELWV  5&  ELWV   6+$ >:$+/
@

Figura 4: Fonte 2UDFOH6HFXULW\

6HFXULW\1HWZRUN
2UDFOH6HFXULW\1HWZRUNSURWHJHD
FRQGHQFLDOLGDGHHLQWHJULGDGHGRVGDGRV
TXHWUDIHJDPSHODUHGHXWLOL]DQGRFULSWRJUD
DGHUHGHLPSHGLQGRTXHRVGDGRVVHMDP
SHUGLGRVRXIDUHMDGRVRXPHVPRVHMDPFOR
QDGRV FDXVDQGR D SHUGD GH  LQIRUPDo}HV
RX TXH SHVVRDV FDSWXUHP  RV GDGRV QR
PHLRGRWUDIHJRSRGHQGRDOWHUDUFRSLDURX
PHVPRDSDJDUDVLQIRUPDo}HV
7RGDDFRPXQLFDomRFRPXPEDQ
FRGHGDGRV2UDFOHSHODUHGHSRGHVHUFULS
WRJUDIDGDFRPR2UDFOH6HFXULW\1HWZRUN
2 6HFXULW\ 1HWZRUN IRUQHFH  FULSWRJUDD
QDWLYDDOJRULWPRVGHLQWHJULGDGHGHGDGRV
HVXSRUWHSDUD6HFXUH6RFNHW/D\HU 66/ 
SDUDSURWHJHURVGDGRVDWUDYpVGDUHGH
Os algoritmos de integridade de
GDGRV H FULSWRJUDD QDWLYD QR  2UDFOH QmR

105

Figura 5: )RQWH2UDFOH1HWZRUN6HFXULW\

2UDFOH'DWDEDVH9DXOW
Os administradores de banco de
GDGRV RV '%$V $GPLQLVWUDGRU GH  %DQ
FR GH 'DGRV  SRVVXHP PXLWRV  DFHVVRV
QREDQFRFRPR2UDFOH'DWDEDVH9DXOWD
SRVVLELOLGDGH GHLPSHGLU TXHXVXiULRVSUL
YLOHJLDGRVGHQWURGR%' %DQFRGH'DGRV 
YHMDPGDGRVVLJLORVRVGDDSOLFDomRYHPVH
WRUQDQGR XP UHTXLVLWR FDGD YH] PDLV  LP
SRUWDQWH QDV RUJDQL]Do}HV$OpP  GLVVR D
FRQVROLGDomR GD DSOLFDomR  UHTXHU HVWULWRV
OLPLWHVHQWUHGDGRVFRQGHQFLDLVGDHPSUH
VDFRPRRVHQFRQWUDGRVHPDSOLFDo}HV

Intercincia
& Sociedade

nanceiras e de recursos humanos.


2UDFOH9DXOWLPSHGHTXHRV'%$V
$GPLQLVWUDGRUGH%DQFRGH'DGRV SURSULH
WiULRVGHDSOLFDo}HVHRXWURVXVXiULRVSULYL
OHJLDGRVYHMDPGDGRVGDDSOLFDomRXVDQGR
VHXVSULYLOpJLRVDYDQoDGRV'DWDEDVH9DXOW
FRORFD HP SUiWLFD FRQWUROHV  SUHYHQWLYRV
DMXGDQGRDUHGX]LURLPSDFWRSRWHQFLDOGH
XPDRFRUUrQFLDUHDOGHYLRODomRGHGDGRV
H SHUPLWLQGR  TXH R '%$ H[HFXWH VHX WUD
EDOKRGHIRUPDPDLVHFD]9DXOWSRGHVHU
XVDGRSDUDSURWHJHUWRGDXPDDSOLFDomRRX
XPFRQMXQWRHVSHFtFRGHWDEHODVYLV}HV
WULJJHUVGHQWURGHXPDDSOLFDomRSHUPLWLQ
GRXPDDSOLFDomRGHVHJXUDQoDDOWDPHQWH
H[tYHOHDGDSWiYHO
As regras de comando do Oracle
'DWDEDVH9DXOWDWLYDPFRQWUROHVGHDXWRUL
]DomR GH YiULRV IDWRUHV TXH VH  HVWHQGHP
DOpP GDV DWULEXLo}HV  WUDGLFLRQDLV GH EDQ
FR GH GDGRV  8VDQGR UHJUDV GH FRPDQGR
H  DXWRUL]DomR GH YiULRV IDWRUHV R DFHVVR
DEDQFRVGHGDGRVSRGHVHUUHVWULWRDXPD
VXEUHGHRXVHUYLGRUGHDSOLFDo}HVHVSHFt
FR FULDQGR XP  FDPLQKR YLUWXDO FRQiYHO
SDUD R DFHVVR  DRV GDGRV$ OLPLWDomR GH
DFHVVRDRVGDGRVDDSOLFDo}HVDSURYDGDV
SRGHVHUREWLGDXVDQGRIDWRUHVGR2UDFOH
'DWDEDVH9DXOWHPFRQMXQWRFRPUHJUDVGH
comando do Oracle. O Oracle Database
9DXOWRIHUHFHYiULRVIDWRUHVLQWHUQRVFRPR
HQGHUHoR ,3  TXH SRGHP VHU XVDGRV LQGL
YLGXDOPHQWH  RX HP FRQMXQWR FRP RXWUDV
UHJUDV GH  VHJXUDQoD SDUD DXPHQWDU  VLJ
QLFDWLYDPHQWH R QtYHO GH VHJXUDQoD  GH
XPDDSOLFDomRH[LVWHQWH$OpPGRVIDWRUHV
LQWHUQRV IRUQHFLGRV SHOR 9DXOW  YRFr SRGH
DGLFLRQDUVHXVIDWRUHVSHUVRQDOL]DGRVSDUD
DWHQGHU DRV  SUySULRV UHTXLVLWRV HPSUHVD
riais.
As regras de comando do Oracle
'DWDEDVH9DXOWRIHUHFHPDSRVVLELOLGDGHGH
LQFRUSRUDUSROtWLFDVGHVHJXUDQoDFRPIDFL
OLGDGH D  SUDWLFDPHQWH TXDOTXHU RSHUDomR
de banco de dados. As regras de comando
SHUPLWHPTXHYRFrUHIRUFHFRQWUROHVLQWHU
QRV H LPSRQKD DV  SUiWLFDV H SROtWLFDV GH
FRQJXUDomRGHVHJXUDQoDUHFRPHQGDGDV
SHORPHUFDGR
$VUHJUDVGHFRPDQGRSRGHPVHU
XVDGDV SDUD DSOLFDU DOWRV QtYHLV GH  SURWH
omR D GDGRV FUtWLFRV SDUD R QHJyFLR 3RU
H[HPSORXPDUHJUDGHFRPDQGRSRGHVHU

106

XVDGDSDUDLPSHGLUTXHTXDOTXHUXVXiULR
DWpPHVPRR'%$ $GPLQLVWUDGRUGH%DQFR
GH'DGRV HOLPLQHWDEHODVGDDSOLFDomRQR
VHXDPELHQWHGHSURGXomR
$H[LELOLGDGHGR2UDFOH9DXOWSHU
PLWHSHUVRQDOL]DUDVHSDUDomR GHUHVSRQ
VDELOLGDGHV GH DFRUGR FRP RV  UHTXLVLWRV
HVSHFtFRV GDV  RUJDQL]Do}HV e SRVVtYHO
VXEGLYLGLU  DLQGD PDLV D UHVSRQVDELOLGDGH
GDDGPLQLVWUDomRGR%' %DQFRGH'DGRV 
HP EDFNXS GHVHPSHQKR H DSOLFDomR  GH
SDWFKHV
2 2UDFOH 9DXOW RIHUHFH  LQ~PHURV
UHODWyULRVSURQWRVTXHOKHRIHUHFHPDSRV
VLELOLGDGHGHUHODWDUDVSHFWRVFRPRWHQWDWL
YDVGHVROLFLWDomRGHDFHVVRDGDGRVEOR
TXHDGRVSHOR9DXOW
5HVSRQVDELOLGDGHVQR2UDFOH9DXOW
$GPLQLVWUDGRU GH 6HJXUDQoD  XP
DGPLQLVWUDGRU GH VHJXUDQoD SRGH  FRQ
gurar as regras de Comando do Database
9DXOWDXWRUL]DURXWURVXVXiULRVDXWLOL]iORV
H H[HFXWDU YiULRV  UHODWyULRV GH VHJXUDQoD
HVSHFtFRVGR'DWDEDVH9DXOW
Administrao do Banco de Dados
'%$DUHVSRQVDELOLGDGHGHDGPLQLVWUDomR
GREDQFRGHGDGRVSHUPLWHTXHXPXVXiULR
FRP RV  SULYLOpJLRV GH '%$ FRQWLQXH H[H
cutando o gerenciamento e a manuteno
normais associados ao banco de dados,
FRPREDFNXSHUHFXSHUDomRDSOLFDomRGH
SDWFKHVHDMXVWHGHGHVHPSHQKR
*HUHQFLDGRUGH&RQWDVXPXVX
iULR FRP D UHVSRQVDELOLGDGH GH  JHUHQFLD
PHQWR GH FRQWDV SRGH FULDU  HOLPLQDU RX
PRGLFDU XVXiULRV GR EDQFR  GH GDGRV
>1(('+$0@
'DWD0DVNLQJ
Oracle Data Masking ajuda as or
JDQL]Do}HVDDWHQGHUDVGHPDQGDVGHSUL
YDFLGDGHHSURWHomRGHGDGRVFRPR6DU
EDQHV2[OH\3&, 3D\PHQW&DUG,QGXVWU\ 
'66 'DWD 6HFXULW\  6WDQGDUG  +,3$$
+HDOWK ,QVXUDQFH  3RUWDELOLW\ DQG$FFRXQ
WDELOLW\$FW  EHP  FRPR LQ~PHUDV OHLV TXH
restringem o uso de dados reais do clien
te. Com o Oracle Data Masking, informa
o}HVVLJLORVDVFRPRQ~PHURVGHFDUWmRGH
FUpGLWRRXGHVHJXULGDGHVRFLDOSRGHPVHU
VXEVWLWXtGRV SRU YDORUHV UHDLV  SHUPLWLQGR
TXH RV GDGRV GH SURGXomR  VHMDP XVDGRV

Intercincia
& Sociedade

GH IRUPD VHJXUD SDUD  GHVHQYROYLPHQWR


WHVWH RX  FRPSDUWLOKDPHQWR FRP SDUFHLURV
WHUFHLUL]DGRV RX RIIVKRUH SDUD RXWUDV  
QDOLGDGHV TXH QmR VHMDP GH  SURGXomR 2
Oracle Data Masking usa uma biblioteca de
modelos e regras de formatao, transfor
PDQGRRVGDGRVGHPRGRFRQVLVWHQWHSDUD
PDQWHUDLQWHJULGDGHGDUHIHUrQFLDSDUDDV
DSOLFDo}HV 2V EHQHItFLRV GR 2UDFOH  'DWD
Masking incluem:
8VR OLYUH GH GDGRV GH  SURGXomR
HPDPELHQWHVGHQmRSURGXomRVHPYLRODU
DV UHJUDV GH  SULYDFLGDGH GRV GDGRV QHP
DUULVFDUVH  D YD]DPHQWR GH GDGRV FRQ
denciais.
Os administradores da segurana
GHQHP XPD YH] DV UHJUDV  GH PDVFDUD
PHQWR TXH VmR HQWmR  DXWRPDWLFDPHQWH
DSOLFDGDV FDGD YH]  TXH R DGPLQLVWUDGRU
de banco de dados mascara o banco de
dados. A descaracterizao de dados con
GHQFLDLVHVWiFDGDYH]PDLVVHQGRUHFR
nhecida como tecnologia fundamental nas
OHLV GH SURWHomR GH  SULYDFLGDGH GH GDGRV
HPWRGRRPXQGR>25$&/(@

HOHYDGR  LPSOHPHQWDQGR QRV PRGHORV GH


EODFNOLVWZKLWHOLVWSURWHJHQGRGHDPHDoDV
VHP FRQVXPR GH WHPSR D  JHULU RV IDOVRV
SRVLWLYRV WDPEpP  SRVVLELOLWD DV RUJDQL]D
o}HV D HQGHUHoDU  UHTXLVLWRV GH FRQIRUPL
dade.
'DWDEDVH )LUHZDOO SRVVXL  DOJX
mas caracteristicas, so elas: Modelos de
LPSOHPHQWDomR H[tYHLV  TXH LQFOXHP PR
QLWRUL]DomRHEORTXHLRSROtWLFDVEDVHDGDV
HPEODFNOLVWZKLWHOLVWHOLVWDVGHH[FHSo}HV
D DFHVVRV RX  PHVPR D XVXiULRV DUTXL
WHFWXUD  DOWDPHQWH HVFDOiYHO SDUD DSOLFD
o}HV  HPSUHVDULDLV GH]HQDV GH UHODWyULRV
GH  FRQIRUPLGDGH LQWHJUDGRV H  SHUVRQDOL
]iYHLVSHUPLWLQGRTXHDVRUJDQL]Do}HVVH
HQTXDGUHPDVQRUPDVGHVHJXUDQoDHGH
DXGLWRULDDOHUWDVGHVHJXUDQoDHPWHPSR
real.
2V FRPSRQHQWHV GR 2UDFOH  )L
UHZDOO VH FRQVWLWXHP HP WUrV SLODUHV  VmR
eles:
2UDFOHGDWDEDVHUHZDOOLQWHUUR
JD H DSOLFD D SROtWLFD GH 64/ j  EDVH GH
dados.
0DQDJHPHQWVHUYHUJHVWmRFHQ
WUDOL]DGDDOHUWDVHUHODWyULRV
$QDO\]HU  $QDOLVD D VHVVmR  GH
64/SDUDHVWDEHOHFHUDVOLQKDVGHEDVHGD
SROtWLFD>25$&/(@

Figura 6: Fonte 2UDFOH6HFXULW\

'DWDEDVH)LUHZDOO
22UDFOH)LUHZDOOPRQLWRUDDDFWL
YLGDGHGDEDVHGHGDGRVGHPRGRDSUHYH
nir o acesso no autorizado,
LQMHo}HVQR64/DOWHUDomRGHSUL
YLOpJLRVHRXWURVDWDTXHVH[WHUQRVHLQWHU
QRVWXGRRQOLQHQDEDVHGHGDGRV3HUPL
WLQGRTXHRVDGPLQLVWUDGRUHVPRQLWRUHPH
controlem todos os acessos realizados na
base de dados.
2UDFOH 'DWDEDVH )LUHZDOO  RIHUH
FHXPVLVWHPDGHHOHYDGDFDSDFLGDGHGH
HVFDODELOLGDGH DVVHUWLYR  H GH UHQGLPHQWR

107

Figura 7:)RQWH2UDFOH)LUHZDOO

6HFXULW\5DGLXV
O Oracle Security Radius fornece
XPFOLHQWH5HPRWR 5$',86 5HPRWH$X
WKHQWLFDWLRQ'LDO,Q8VHU6HUYLFHTXHSHUPL
WHTXHREDQFRGHGDGRVUHVSHLWHDDXWHQWL
FDomRHDVDXWRUL]Do}HVGHFODUDGDVSRUXP
VHUYLGRU2UDFOHSUpFRQJXUDGR
(VVHUHFXUVRpSDUWLFXODUPHQWH~WLO
SDUDHPSUHVDVLQWHUHVVDGDVQDDXWHQWLFD

Intercincia
& Sociedade

omR GH GRLV IDWRUHV TXH  HVWDEHOHFH VXD


LGHQWLGDGHFRPEDVHQRTXHYRFrVDEH VH
QKDRXLQIRUPDo}HV HQRTXHYRFrWHP R
FDUWmRGHWRNHQRXXPFDUWmRFRPVHQKDV 
606  JHUDGRV SHODV DJrQFLDV EDQFDULDV
IRUQHFLGRSRUDOJXQV%DQFRV
5$',86pXPVLVWHPDGLVWULEXtGR
TXHSURWHJHRDFHVVRUHPRWRDVHUYLoRVGH
rede no banco de dados e est consolida
GRFRPRXPSDGUmRQRVHWRUSDUDDFHVVR
remoto e controla os acessos feitos nas
redes. As credenciais de usurio e as in
IRUPDo}HVGHDFHVVRQR5$',86VmRGH
QLGDVQRVHUYLGRU2UDFOHSDUDSHUPLWLUTXH
XPVHUYLGRUH[WHUQRUHDOL]HRVVHUYLoRVGH
autenticao, autorizao e contabilidade
TXDQGRVROLFLWDGRV
2VXSRUWHDR5$',86QR2UDFOHp
XPD LPSOHPHQWDomR GRV  SURWRFRORV FOLHQ
WHVGR5HPRWH8VHU6HUYLFHTXHSHUPLWHP
TXH R EDQFR GH  GDGRV IRUQHoD DXWHQWLFD
omR  DXWRUL]DomR H FRQDELOLGDGH D XVXi
ULRVQR%' %DQFRGH'DGRV 
2VHUYLoRHQYLDVROLFLWDo}HVGHDX
WHQWLFDomRDRVHUYLGRUHDWXDFRQIRUPHDV
UHVSRVWDV GR EDQFR$  DXWHQWLFDomR SRGH
RFRUUHUHPPRGRGHDXWHQWLFDomRVtQFURQR
RXDVVtQFURQRHID]SDUWHGDFRQJXUDomR
GR2UDFOHSDUDVXSRUWHDRVGDGRVDORFDGRV
no banco.
2 2UDFOH$GYDQFHG 6HFXULW\  SUR
SRUFLRQD DXWHQWLFDomR UHVSHLWD  DXWRUL]D
o}HVDUPD]HQDGDVQR5$',86HVHUYLoRV
bsicos de controle de acessos de usurios
GR 5$',86  TXDQGR DFHVVDP R EDQFR GH
dados
2UDFOHYLDVHQKDVRXFULSWRJUDDV
OLEHUDGDVSHORVHUYLoR>1(('+$0@

O banco de dados Oracle ofere


FHRVPDLVDYDQoDGRVFRQWUROHVGHDFHVVR
do mercado. A Oracle introduziu recursos
DYDQoDGRV GH  FRQWUROH GH DFHVVR FRPR
R %DQFR GH  'DGRV 9LUWXDO 3DUWLFXODU H R
2UDFOH/DEHO6HFXULW\2FXPSULPHQWRGRV
ULJRURVRVUHTXLVLWRVGHFRQWUROHLQWHUQRHQ
FRQWUDGRV QRV UHJXODPHQWRV H[LJH R  FRQ
WUROHGHDFHVVRDEDQFRVGHGDGRVDSOLFD
o}HVHGDGRVGHGHQWURGREDQFRGHGDGRV
FRPSOHPHQWDQGRDLPSRVLomRH[LVWHQWHQR
QtYHOGDDSOLFDomR
O Oracle oferece controles de se
JXUDQoDH[tYHLVWUDQVSDUHQWHVHDOWDPHQ
WHDGDSWiYHLVTXHQmRUHTXHUHPPXGDQoDV
QDDSOLFDomR2VXVXiULRVSULYLOHJLDGRVSR
GHP VHU  LPSHGLGRV GH DFHVVDU GDGRV GD
DSOLFDomRHDVHSDUDomRGHUHVSRQVDELOL
GDGHV SRGH VHU DSOLFDGD  DRV DGPLQLVWUD
GRUHV GH EDQFR GH  GDGRV H[LVWHQWHV VHP
D QHFHVVLGDGH  GH XP SURFHGLPHQWR FDUR
H GHPRUDGR  GH GHQLomR GH SULYLOpJLR Pt
nimo. O Oracle utiliza inmeros controles
WpFQLFRV GH DFHVVR HP WHPSR UHDO SDUD
DWLQJLUHVVHVQtYHLVGHSURWHomR
,PSHGH TXH XVXiULRV  DOWDPHQWH
SULYLOHJLDGRVDFHVVHPGDGRVGDDSOLFDomR
$XWRUL]DomR GH YiULRV  IDWRUHV FULD FDPL
QKRV FRQiYHLV SDUD  RV GDGRV GHQLQGR
SRUTXHPTXDQGRRQGHHFRPRDVDSOLFD
o}HVGDGRVHEDQFRVGHGDGRVVmRDFHV
sados.
5HJUDV GH FRPDQGR DSOLFDP  DV
SROtWLFDV RSHUDFLRQDLV FRP EDVH QD  VHJX
UDQoD GH 7, 7HFQRORJLD GD  ,QIRUPDomR  H
HPUHFRPHQGDo}HVGHDXGLWRULDLQWHUQDRX
H[WHUQD>*5$d$',2@
6. CONSIDERAES FINAIS

Figura 8: )RQWH2UDFOH$GYDQFHG6HFXULW\


&RQWUROHGH$FHVVRQR2UDFOH*

108

6HQGR DVVLP FRQFOXtPRV TXH


DSyVRHVWXGRUHDOL]DGRGHVFREULPRVTXH
QRV ~OWLPRV DQRV RFRUUHUDP GLYHUVRV LQFL
dentes de roubo de identidade e fraudes de
LQIRUPDo}HV D  EDQFR GH GDGRV HP YiULDV
LQVWLWXLo}HVFRPLVVRDHPSUHVD2UDFOHWHP
EXVFDGRLQYHVWLUHPVHJXUDQoDDYDQoDGD
1HVVHHVWXGRIRLWUDWDGDDYHUVmR
2UDFOH * UHOHDVH  YHUVmR  GLVSRQLELOL
]DGDSHOD2UDFOHTXHIRLGHVHQYROYLGRHP
 FRP PDLV GH   UHFXUVRV  PL
OK}HVGHKRUDVGHWHVWHVHSHVVRD
PHVHVGHGHVHQYROYLPHQWR

Intercincia
& Sociedade

$2UDFOHSURSRUFLRQDXPDVHJX
UDQoDWUDQVSDUHQWHDVHXVXVXiULRVEDVH
DGD HP SDGU}HV GH  EDQFR GH GDGRV TXH
SURWHJH DV  LQIRUPDo}HV SRU PHLR GH FULS
WRJUDDDUPD]HQDQGRGDGRVDORFDGRVHP
VHXEDQFRWUDWDQGRDUTXLYRVDUPD]HQDGRV
FRP VHUYLoRV GH DXWHQWLFDomR IRUWH  DP
SOLDQGR D HVWUXWXUD GH VHJXUDQoD  H[LVWHQ
WHQDVHPSUHVDVRXVHMDWRGRDFHVVRDR
EDQFRGHGDGRVUHTXHUDXWHQWLFDomRXVXi
ULDRXGHDSOLFDo}HV
7. TRABALHOS FUTUROS
2 WUDEDOKR SURSRVWR IRL XP  OHYDQWD
PHQWR %LEOLRJUiFR SRUWDQWR  VXJHULPRV FRPR
WUDEDOKR IXWXURV D  LPSOHPHQWDomR H DYDOLDomR
da segurana do Banco de Dados Oracle 11G
5HOHDVH

REFERNCIAS BIBLIOGRFICAS
%(518&, 7K\DJR Novidades para desenvolvedores no Oracle 11g GLVSRQtYHO  HP KWWSZZZ
GHYPHGLDFRPEUQRYLGDGHV SDUDGHVHQYROYHGRUHV
QRRUDFOHJUHYLVWDVTO
PDJD]LQHSDUWH
L[]]D[-L.)Y!
$FHVVRHPGH$JRVWR

NEEDHAM, Paul. Oracle Advanced SecurityGLVSR


QtYHO HP  KWWSZZZRUDFOHFRPWHFKQHWZRUNGDWD
EDVHRSWLRQVDGYDQFHGVHFXULW\LQGH[KWPO!
$FHVVRHPGH0DLR
NEEDHAM, Paul. Oracle Database Vault GLVSRQtYHO
HP  KWWSZZZRUDFOHFRPWHFKQHWZRUNHQGDWDED
VHHQWHUSULVHGLWLRQVHJXUDQ&$D FRQIRUPLGD
GHGDWDEDVHJSWESGI!$FHVVRHPGH
6HWHPEUR
NEEDHAM, Paul. Oracle Security Radius GLVSRQt
YHOHPKWWSZZZRUDFOHFRPWHFKQHWZRUNGDWDED
VHVHFXULW\!$FHVVRHPGH$JRVWR
ORACLE. A Histria da Oracle e Verses existentes GLVSRQtYHOHPKWWSZZZRUDFOHFRPEUFRUSR
UDWHSUHVVVWRU\SWEKWPO!$FHVVRHPGH
-XQKR
25$&/( &RUSRUDWLRQ Oracle Advanced Security
Encryption GLVSRQtYHO HP  KWWSZZZRUDFOHFRP
WHFKQHWZRUNGDWDEDVHVHFXULW\RZSVHFXULW\GDWD
EDVHJUSGI  !$FHVVR HP  GH -XQKR


5$0(= (OPDVUL  1$9$7+( 6% Sistemas de


Banco de Dados3HDUVRQ$GGLVRQ:HVOH\

25$&/( &RUSRUDWLRQ Oracle Database Firewall


GLVSRQtYHO HP  KWWSZZZRUDFOHFRPWHFKQHWZRUN
SURGXFWVGDWDEDVHUHZDOOLQGH[KWPO! $FHVVR HP
GH-XOKR

)5((0$1 * 5REHUW 3$&. &KDUOHV 67816


'RXJ %87(5%$8*+ 7LP Oracle Database 11G
$GPLQLVWUDWRU &HUWLHG 3URVVLRQDO :LOH\ 3X
EOLVKLQJ,QF

81,&$03 %DQFRV GH 'DGRV Conceito de Segurana de Banco de dados GLVSRQtYHO HP  KWWS
XQLFDPSEUSXEDSRLRWUHLQDPHQWRVEDQFRGDGRVFXU
VRGESGI!$FHVVRHPGH-XQKR

)857$'2$ / 6$1726 & 6 Organizao de


Banco de Dados  (G 5LR GH -DQHLUR  &DPSXV


81,&$036HJXUDQoDHP7HFQRORJLDGD,QIRUPDomR
Conceito Segurana Tecnologia da Informao
GLVSRQtYHO HP  +WWSXQLFDPSEUSXEDSRLRWUHLQD
PHQWRV6HJXUDQFDVHJSGI!$FHVVRHPGH-XQKR


*5$d$',2 0DUFHOR 0RUHLUD Controle de acesso Oracle Database GLVSRQtYHO HP  KWWSZZZ
GHYPHGLDFRPEUXSJUDGHSDUDR RUDFOHGDWDEDVH
SDUDJUHYLVWDVTOPDJD]LQH ! $FHVVR
HPGH$JRVWR
,'&:RUOG:LOGHPesquisa de Mercado Bancos de
dados 0XQGR GLVSRQtYHO HP  KWWSZZZLGFFRP
SURGVHUYSURGVHUYMVS"W ! $FHVVR
HPGH-XQKR

109

,03$&7$ *UXSR Pesquisa de Mercado Bancos


de dados BrasilGLVSRQtYHOHPKWWSZZZLPSDF
WDFRPEUDLPSDFWDSGIVEDQFRGDGRV!$FHVVRHP
GH-XQKR

:$+/3HWHUData Masking OracleGLVSRQtYHOHP


KWWSZZZRUDFOHFRPVHFXULW\GDWDEDVHGDWDPDVNL
VHFXULW\LQGH[KWPO!$FHVVRHPGHMXOKR
:$+/3HWHUSecurity and ComplianceGLVSRQtYHO
HP  KWWSZZZRUDFOHFRPWHFKQHWZRUNGDWDEDVH
VHFXULW\LQGH[KWPO!$FHVVRHPGH-XQKR

Intercincia
& Sociedade

Luiz Antonio Sacco pDOXQRGRFXUVRGH&LrQFLDGD&RPSXWDomRGD)DFXOGDGH0XQLFLSDO3URIHVVRU)UDQFR


0RQWRUR)03)0$WXDOPHQWHp$QDOLVWDGH6LVWHPDVQDHPSUHVD7HQQHFR$XWRPRWLYH%UDVLO/WGDHP0RJL
Mirim SP.
Patrcia Aparecida Zibordi Aceti SRVVXLJUDGXDomRHP7HFQRORJLDHP3URFHVVDPHQWRGH'DGRVSHOD)XQ
GDomR3LQKDOHQVHGH(QVLQR(VSHFLDOLVWDHP$QiOLVHGH6LVWHPDVSHOD3RQWLItFLD8QLYHUVLGDGH&DWyOLFDGH
&DPSLQDV0HVWUHHP6LVWHPDVGH,QIRUPDomRSHOD3RQWLItFLD8QLYHUVLGDGH&DWyOLFDGH&DPSLQDV0HVWUHHP
(QJHQKDULDGH3URGXomRSHOD8QLYHUVLGDGH0HWRGLVWDGH3LUDFLFDED81,&$03$WXDFRPRSURIHVVRUDXQLYHUVL
WiULDGHVGHp&RRUGHQDGRUDGR&HQWUR5HJLRQDO8QLYHUVLWiULRGH(VStULWR6DQWRGR3LQKDO (VStULWR6DQWR
GR3LQKDO63 HSURIHVVRUDGD)DFXOGDGH0XQLFLSDO3URIHVVRU)UDQFR0RQWRURUHDVGHLQWHUHVVHHPSHVTXL
VD$OJRULWPRVFRPSOH[RVHGHVHQYROYLPHQWRGHSURJUDPDVHVLVWHPDVGHFRPSXWDomR

110

Intercincia
& Sociedade

Das könnte Ihnen auch gefallen