SlideShare a Scribd company logo
1 of 6
Nizwa College of Technology
Assignment 2
26s1368
Submitted to: Ms. Kalivani
Submitted from: Hajer Mohamed Said Alriyami
Submitted date: 16/3/2017
Computer security
And
Session management
Nizwa College of Technology
Assignment 2
26s1368
INTRODUCTION
What is Computer Security?
Computer Security is the protection of computing systems and the data that
they store or access.
Why is Computer Security Important?
Computer Security allows the University to carry out its mission by:
 Enabling people to carry out their jobs, education, and research
 Supporting critical business process
 Protecting personal and sensitive information
Why do I need to learn about Computer Security? Isn't this just an I.T.
problem?
Good Security Standards follow the "90 / 10" Rule:
 10% of security safeguards are technical.
 90% of security safeguards rely on the computer user ("YOU") to
adhere to good computing practices
Example: The lock on the door is the 10%. You remembering to lock the
lock, checking to see if the door is closed, ensuring others do not prop the
door open, keeping control of the keys, etc. is the 90%. You need both parts
for effective security
What Does This Mean for Me?
 This means that everyone who uses a computer or mobile device
needs to understand how to keep their computer, device and data
secure.
o --> Information Technology Security
is everyone's responsibility!
 Members of the UCSC community are also responsible for
familiarizing themselves and complying with all University policies,
procedures and standards relating to information security --
Nizwa College of Technology
Assignment 2
26s1368
Security Objectives
 Learn "good computing security practices."
 Incorporate these practices into your everyday routine. Encourage
others to do so as well.
 Report anything unusual - Notify your supervisor and the ITS
 Support Center if you become aware of a suspected security incident
Sessionsand SessionManagement
Access Manager sessionmanagement refers to the process ofmanaging
the lifecycle requirements of a session, and notification of sessionevents
to enable global logout. Administrators can configure Access Manager
session lifecycle settings using the Oracle Access Management Console.
Here, we will look at several different tools and techniques for managing
sessions in the database.
Users are very important to a DBA in many ways, but first they are the
reason why there is need for a DBA. Users (either real or their electronic
counterparts) are what keep the database in motion. Managing sessions
means the DBA must monitor, tune and troubleshoot the entire
outstanding user's activity in the oracle instance. We have different faces
of database activity throughout the day, and over weeks, months, and
years. It looks like the same data behaving differently throughout a given
period, so there will be moments when the database is reported to
be slow, there will be times when the database apparently will hang, and
there will be other times when the database's performance will
look normalfrom the user's perspective. What is the reason why the
database's performance changes?
Monitoring, diagnosing, and troubleshooting sessions involve several
tools and techniques; specific sections of Enterprise Manager are focused
on session management, as we will see throughout this report. The
exposed tools behave the same on Unix like and Windows environments;
except the troubleshooting last resource, killing the session, which has
specific behaviors on Windows platforms due to the specific architecture
implementation, and we will have to deal with it by using the oracle tool.
In this context the user sessioncan either be a session generated by a real
user or by a program directed to perform some activity against the
Nizwa College of Technology
Assignment 2
26s1368
database. This session can be connected either in dedicated or shared
mode.
User sessions in a dedicated server
architecture
When a user requests a remote connection to the database it must first
contact the listener. The listener redirects the request to the Oracle
Instance. This will spawn a new Oracle Server Process, which from now
on will be the process who will interface the user with the database; if the
connection to the database is local to the machine, it may be established
across the network or by Inter-Process Communication(IPC) , and the
Oracle server process will be spawned too. This Oracle server process
will be assigned to the user for the whole time the user remains attached
to the database. The new user sessionwill be assigned a Serial Number
and a SessionId. These are the numbers used to uniquely identify a user
connected to the database. The serial number guarantees that session-
level commands are applied to the correct sessionobjects in case a new
session is started with the same SID. A user session can be initially
monitored with the V$SESSION dynamic view.
The PMON background process registers the Oracle instance against
the Listener (in a self registration configuration), PMON registers
information about dedicated server processeswith the Listener. A User
Processstarts a connection against the Oracle instance by looking for
the Listener, the Listener redirects the user process to the oracle Server
Processand the dialog will be conducted from now on between the oracle
server process and the user process. Foreach active connection in
Nizwa College of Technology
Assignment 2
26s1368
a DedicatedServerArchitecture there will be one oracle Server
Processonthe hostmachine.
The connection through a dedicated server is the most widely used
connection mode in most Oracle databases.
Blocking sessions
When two or more different sessions compete for the same row
simultaneously, Oracle will immediately raise the lock enqueue
mechanism, which lets one process at a time modify the row. The lock
will be released once the transaction is finished (after a commit or
rollback command is issued). The first process that takes the row locks it,
meanwhile the other processes will have to wait. If this wait time is
visible to the user then it can be misinterpreted as a slow performance
problem.
Blocking sessions are issues that should be solved at the program level,
but in the mean time it is the DBA's responsibility to detect them and fix
them. A blocking sessionmay be normal during productiontime, this is
not the real problem. Oracle is prepared to queue sessions, the real
problem begins when a session hangs and leaves the other session
indefinitely waiting for the row lock to be released.
Code use:
Create sessionmangers limit
Create usermanger1 identified by 123;
Grant create sessionto manger1 identified by 123;
Alter user manger1 sessionmangers;
alter sessionmangers limit password_life_time 10/1440
password_grace_time 2/1440;
Nizwa College of Technology
Assignment 2
26s1368
create tablespaceschool_ts datafile 'c:tempschool.dbf' size 100M
extent management localautoallocate segmentspace management;
create temporary tablespace schooltemp_ts tempfile
'c:tempschooltmp.dbf' size 20M reuse extent management local
uniform size 10M;
alter user manger1 quota 500 on school_ts;
Reference:
https://www.safaribooksonline.com
http://its.ucsc.edu/policies/index.html
its.ucsc.edu/security/training/intro.html
https://docs.oracle.com/cd/E27559_01/admin.1112/.../session.htm

More Related Content

What's hot

McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Study
joepanora
 

What's hot (10)

Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Database modeling and security
Database modeling and securityDatabase modeling and security
Database modeling and security
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
1784 1788
1784 17881784 1788
1784 1788
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Study
 
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLEDATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
 

Similar to Computer Security

Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
Jennifer Lopez
 
Dynamic Access Control for RBAC-administered web-based Databases
Dynamic Access Control for RBAC-administered web-based DatabasesDynamic Access Control for RBAC-administered web-based Databases
Dynamic Access Control for RBAC-administered web-based Databases
Thitichai Sripan
 
Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...
master student
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written report
Luis Perez
 
Introduction to Java Enterprise Edition
Introduction to Java Enterprise EditionIntroduction to Java Enterprise Edition
Introduction to Java Enterprise Edition
Abdalla Mahmoud
 

Similar to Computer Security (20)

Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
 
Attivio Active Security Technical Brief
Attivio Active Security Technical BriefAttivio Active Security Technical Brief
Attivio Active Security Technical Brief
 
Operating system
Operating systemOperating system
Operating system
 
Operating system
Operating systemOperating system
Operating system
 
Basic features of distributed system
Basic features of distributed systemBasic features of distributed system
Basic features of distributed system
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
Operating system
Operating systemOperating system
Operating system
 
Dynamic Access Control for RBAC-administered web-based Databases
Dynamic Access Control for RBAC-administered web-based DatabasesDynamic Access Control for RBAC-administered web-based Databases
Dynamic Access Control for RBAC-administered web-based Databases
 
Firo
FiroFiro
Firo
 
Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...
 
Mit201– operating system
Mit201– operating systemMit201– operating system
Mit201– operating system
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written report
 
Operating system Concepts
Operating system Concepts Operating system Concepts
Operating system Concepts
 
oracle
oracleoracle
oracle
 
Introduction to Java Enterprise Edition
Introduction to Java Enterprise EditionIntroduction to Java Enterprise Edition
Introduction to Java Enterprise Edition
 
5 practical operability techniques - Matthew Skelton - SkillsMatter 2018
5 practical operability techniques - Matthew Skelton - SkillsMatter 20185 practical operability techniques - Matthew Skelton - SkillsMatter 2018
5 practical operability techniques - Matthew Skelton - SkillsMatter 2018
 
Locks In Disributed Systems
Locks In Disributed SystemsLocks In Disributed Systems
Locks In Disributed Systems
 
How to choose the right network monitor for your application
How to choose the right network monitor for your applicationHow to choose the right network monitor for your application
How to choose the right network monitor for your application
 
Apps session wait_tables
Apps session wait_tablesApps session wait_tables
Apps session wait_tables
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 

More from Hajer alriyami (8)

penetration test
penetration testpenetration test
penetration test
 
IDS
IDSIDS
IDS
 
Positive thinking
Positive thinkingPositive thinking
Positive thinking
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
“3rd Millennium’s Technological Impact to Medicine, Education, and Society”
“3rd Millennium’s Technological Impact to Medicine, Education, and Society”“3rd Millennium’s Technological Impact to Medicine, Education, and Society”
“3rd Millennium’s Technological Impact to Medicine, Education, and Society”
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
SSUCCESS
SSUCCESSSSUCCESS
SSUCCESS
 
Presentation1Shell
Presentation1ShellPresentation1Shell
Presentation1Shell
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Computer Security

  • 1. Nizwa College of Technology Assignment 2 26s1368 Submitted to: Ms. Kalivani Submitted from: Hajer Mohamed Said Alriyami Submitted date: 16/3/2017 Computer security And Session management
  • 2. Nizwa College of Technology Assignment 2 26s1368 INTRODUCTION What is Computer Security? Computer Security is the protection of computing systems and the data that they store or access. Why is Computer Security Important? Computer Security allows the University to carry out its mission by:  Enabling people to carry out their jobs, education, and research  Supporting critical business process  Protecting personal and sensitive information Why do I need to learn about Computer Security? Isn't this just an I.T. problem? Good Security Standards follow the "90 / 10" Rule:  10% of security safeguards are technical.  90% of security safeguards rely on the computer user ("YOU") to adhere to good computing practices Example: The lock on the door is the 10%. You remembering to lock the lock, checking to see if the door is closed, ensuring others do not prop the door open, keeping control of the keys, etc. is the 90%. You need both parts for effective security What Does This Mean for Me?  This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device and data secure. o --> Information Technology Security is everyone's responsibility!  Members of the UCSC community are also responsible for familiarizing themselves and complying with all University policies, procedures and standards relating to information security --
  • 3. Nizwa College of Technology Assignment 2 26s1368 Security Objectives  Learn "good computing security practices."  Incorporate these practices into your everyday routine. Encourage others to do so as well.  Report anything unusual - Notify your supervisor and the ITS  Support Center if you become aware of a suspected security incident Sessionsand SessionManagement Access Manager sessionmanagement refers to the process ofmanaging the lifecycle requirements of a session, and notification of sessionevents to enable global logout. Administrators can configure Access Manager session lifecycle settings using the Oracle Access Management Console. Here, we will look at several different tools and techniques for managing sessions in the database. Users are very important to a DBA in many ways, but first they are the reason why there is need for a DBA. Users (either real or their electronic counterparts) are what keep the database in motion. Managing sessions means the DBA must monitor, tune and troubleshoot the entire outstanding user's activity in the oracle instance. We have different faces of database activity throughout the day, and over weeks, months, and years. It looks like the same data behaving differently throughout a given period, so there will be moments when the database is reported to be slow, there will be times when the database apparently will hang, and there will be other times when the database's performance will look normalfrom the user's perspective. What is the reason why the database's performance changes? Monitoring, diagnosing, and troubleshooting sessions involve several tools and techniques; specific sections of Enterprise Manager are focused on session management, as we will see throughout this report. The exposed tools behave the same on Unix like and Windows environments; except the troubleshooting last resource, killing the session, which has specific behaviors on Windows platforms due to the specific architecture implementation, and we will have to deal with it by using the oracle tool. In this context the user sessioncan either be a session generated by a real user or by a program directed to perform some activity against the
  • 4. Nizwa College of Technology Assignment 2 26s1368 database. This session can be connected either in dedicated or shared mode. User sessions in a dedicated server architecture When a user requests a remote connection to the database it must first contact the listener. The listener redirects the request to the Oracle Instance. This will spawn a new Oracle Server Process, which from now on will be the process who will interface the user with the database; if the connection to the database is local to the machine, it may be established across the network or by Inter-Process Communication(IPC) , and the Oracle server process will be spawned too. This Oracle server process will be assigned to the user for the whole time the user remains attached to the database. The new user sessionwill be assigned a Serial Number and a SessionId. These are the numbers used to uniquely identify a user connected to the database. The serial number guarantees that session- level commands are applied to the correct sessionobjects in case a new session is started with the same SID. A user session can be initially monitored with the V$SESSION dynamic view. The PMON background process registers the Oracle instance against the Listener (in a self registration configuration), PMON registers information about dedicated server processeswith the Listener. A User Processstarts a connection against the Oracle instance by looking for the Listener, the Listener redirects the user process to the oracle Server Processand the dialog will be conducted from now on between the oracle server process and the user process. Foreach active connection in
  • 5. Nizwa College of Technology Assignment 2 26s1368 a DedicatedServerArchitecture there will be one oracle Server Processonthe hostmachine. The connection through a dedicated server is the most widely used connection mode in most Oracle databases. Blocking sessions When two or more different sessions compete for the same row simultaneously, Oracle will immediately raise the lock enqueue mechanism, which lets one process at a time modify the row. The lock will be released once the transaction is finished (after a commit or rollback command is issued). The first process that takes the row locks it, meanwhile the other processes will have to wait. If this wait time is visible to the user then it can be misinterpreted as a slow performance problem. Blocking sessions are issues that should be solved at the program level, but in the mean time it is the DBA's responsibility to detect them and fix them. A blocking sessionmay be normal during productiontime, this is not the real problem. Oracle is prepared to queue sessions, the real problem begins when a session hangs and leaves the other session indefinitely waiting for the row lock to be released. Code use: Create sessionmangers limit Create usermanger1 identified by 123; Grant create sessionto manger1 identified by 123; Alter user manger1 sessionmangers; alter sessionmangers limit password_life_time 10/1440 password_grace_time 2/1440;
  • 6. Nizwa College of Technology Assignment 2 26s1368 create tablespaceschool_ts datafile 'c:tempschool.dbf' size 100M extent management localautoallocate segmentspace management; create temporary tablespace schooltemp_ts tempfile 'c:tempschooltmp.dbf' size 20M reuse extent management local uniform size 10M; alter user manger1 quota 500 on school_ts; Reference: https://www.safaribooksonline.com http://its.ucsc.edu/policies/index.html its.ucsc.edu/security/training/intro.html https://docs.oracle.com/cd/E27559_01/admin.1112/.../session.htm