
{"id":183,"date":"2007-05-16T22:09:25","date_gmt":"2007-05-17T01:09:25","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=183"},"modified":"2007-05-16T22:09:25","modified_gmt":"2007-05-17T01:09:25","slug":"introduccion-a-la-seguridad-oracle","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/","title":{"rendered":"Introducci\u00c3\u00b3n a la seguridad Oracle"},"content":{"rendered":"<p>La seguridad Oracle suele ser de gran importancia. Le guste o no a la gente, Oracle tiene desplegados a lo largo y ancho del planeta una cantidad enorme de productos, que adem\u00c3\u00a1s suelen ocupar posiciones cr\u00c3\u00adticas en las infraestructuras de TI. Son, a fin de cuentas, productos especializados, y sin entrar en detalles sobre lo buenos o malos que pueden ser, son el respaldo de muchas compa\u00c3\u00b1\u00c3\u00adas en lo que a tecnolog\u00c3\u00ada se refiere.<\/p>\n<p><img decoding=\"async\" alt=\"oracle\" src=\"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif\" \/><\/p>\n<p>A Oracle se la critica mucho, y yo me incluyo. Quiz\u00c3\u00a1s algunas veces estas cr\u00c3\u00adticas se hagan a la ligera, ya que muchas de estas voces en contra emanan de personas que no tienen contacto con el d\u00c3\u00ada a d\u00c3\u00ada de una explotaci\u00c3\u00b3n real Oracle ni de cualquier otra, y por tanto, no tienen una perspectiva real de lo que supone el enorme esfuerzo de mantener actualizada una infraestructura de producci\u00c3\u00b3n. Quien crea que actualizar una base de datos es igual de simple que actualizar un Windows o un Linux de sobremesa, se equivoca.<\/p>\n<p>Tambi\u00c3\u00a9n es necesario comentar que la seguridad Oracle va mucho m\u00c3\u00a1s all\u00c3\u00a1 de la gesti\u00c3\u00b3n de actualizaciones de sus productos. Muestra de ello <a href=\"http:\/\/www.oracle.com\/technology\/getting-started\/security.html\">es esta estupenda colecci\u00c3\u00b3n documental<\/a> que el propio fabricante ha puesto a disposici\u00c3\u00b3n de todos nosotros.<\/p>\n<p>Esta colecci\u00c3\u00b3n, llamada <em><a href=\"http:\/\/www.oracle.com\/technology\/getting-started\/security.html\">Getting Started With Security<\/a><\/em>, se compone inicialmente de siete subdivisiones o pasos, en los que se analizan algunos aspectos b\u00c3\u00a1sicos y elementales de la seguridad de los productos Oracle. Estos pasos son:<\/p>\n<p>* Algunos principios de sentido com\u00c3\u00ban aplicables a la seguridad de base de datos<br \/>\n* El empleo de un <em>checklist<\/em> de seguridad para auditor\u00c3\u00ada de base de datos Oracle<br \/>\n* Nociones de cifrado de datos<br \/>\n* Granularidad de la seguridad en funci\u00c3\u00b3n a etiquetas de sensibilidad<br \/>\n* La restricci\u00c3\u00b3n del acceso a datos<br \/>\n* El despliegue de un modelo de seguridad basado en roles, y<br \/>\n* Nociones para aprender a usar la auditor\u00c3\u00ada basada en pol\u00c3\u00adticas, una de las caracter\u00c3\u00adsticas m\u00c3\u00a1s interesantes de los productos Oracle.<\/p>\n<p>Visto <a href=\"http:\/\/caballe.cat\/2007\/05\/15.html#a8795\">en el blog de Xavi Caball\u00c3\u00a9<\/a>. Una referencia muy \u00c3\u00batil, sin duda.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.sahw.com\/wp\/\">http:\/\/www.sahw.com\/wp\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La seguridad Oracle suele ser de gran importancia. Le guste o no a la gente, Oracle tiene desplegados a lo largo y ancho del planeta una cantidad enorme de productos, que adem\u00c3\u00a1s suelen ocupar posiciones cr\u00c3\u00adticas en las infraestructuras de TI. Son, a fin de cuentas, productos especializados, y sin entrar en detalles sobre lo [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3,1],"tags":[],"class_list":["post-183","post","type-post","status-publish","format-standard","hentry","category-articulos","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Introducci\u00c3\u00b3n a la seguridad Oracle<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Introducci\u00c3\u00b3n a la seguridad Oracle\",\"datePublished\":\"2007-05-17T01:09:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/\"},\"wordCount\":371,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif\",\"articleSection\":[\"Art\u00c3\u00adculos\",\"Profesional\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Introducci\u00c3\u00b3n a la seguridad Oracle\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif\",\"datePublished\":\"2007-05-17T01:09:25+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#primaryimage\",\"url\":\"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif\",\"contentUrl\":\"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Introducci\u00c3\u00b3n a la seguridad Oracle","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Introducci\u00c3\u00b3n a la seguridad Oracle","datePublished":"2007-05-17T01:09:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/"},"wordCount":371,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#primaryimage"},"thumbnailUrl":"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif","articleSection":["Art\u00c3\u00adculos","Profesional"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/","url":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Introducci\u00c3\u00b3n a la seguridad Oracle","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#primaryimage"},"thumbnailUrl":"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif","datePublished":"2007-05-17T01:09:25+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/introduccion-a-la-seguridad-oracle\/#primaryimage","url":"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif","contentUrl":"http:\/\/www.maestrosdelweb.com\/images\/actualidad\/logo_oracle.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=183"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/183\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}