or on combinations of factor that can include user name, application, and time and so on. Security policies can trigger auditing when specified elements in an Oracle database are accessed or altered, including the contents within a specified object.
Auditing is typically used for the following:
- Enabling the future accountability for current actions taken in a particular schema, table, or row, or affecting specific content.
- Deter users or any other person from inappropriate actions based on that accountability.
- Investigate suspicious activity. For example, if some user is deleting data from tables, then the