How to check the locked objects in the database

SELECT l.inst_id,SUBSTR(L.ORACLE_USERNAME,1,8) ORA_USER, SUBSTR(L.SESSION_ID,1,3) SID,
S.serial#,
SUBSTR(O.OWNER||’.’||O.OBJECT_NAME,1,40) OBJECT, P.SPID OS_PID,
DECODE(L.LOCKED_MODE, 0,’NONE’,1,’NULL’,2,’ROW SHARE’,3,’ROW EXCLUSIVE’,4,’SHARE’,5,’SHARE ROW EXCLUSIVE’,
6,’EXCLUSIVE’,
NULL) LOCK_MODE
FROM sys.GV_$LOCKED_OBJECT L, DBA_OBJECTS O, sys.GV_$SESSION S, sys.GV_$PROCESS P
WHERE L.OBJECT_ID = O.OBJECT_ID
and    l.inst_id = s.inst_id
AND L.SESSION_ID = S.SID
and    s.inst_id = p.inst_id
AND S.PADDR = P.ADDR(+)
order by  l.inst_id ;

select * from sys.GV_$LOCKED_OBJECT;

Securing implementation of IoT

The Internet of Things is advancing the future of business, bringing new capabilities and efficiencies to companies. Security is a core requirement for manufacturers, engineers, administration suppliers and other people who deliver and utilize associated devices. Most of these – especially those used on the “Internet of Things” – rely on a complex web of embedded systems. Securing these frameworks is a noteworthy test, yet inability to do as such can bring about disastrous results.

Every organization should take the following steps to secure their IoT system:

  • Assess the risk with approved risk management procedure.
  • Take necessary measures to secure both information and devices.
  • Need to align both organization and governance for IoT ecosystem.
  • Organization should define and align with legal and regulatory issues regarding this.

Securing Internet connected devices

Cyber-criminals are broadening their nets to focus on an assortment of gadgets and stages. When new devices are completely unprotected, they can be very vulnerable to malware infections or social engineering scams that can steal personal information.

  • Antivirus software is vital yet it is should have been mindful of fake antivirus software. Ensure; dependably buy the security software from a trustworthy seller. Security software ought to incorporate at any rate: continuous hostile to infection, a two-way firewall, against spyware, against phishing and safe inquiry abilities.
  • Protection of data from theft/loss is the first priority. In case of buy any product or device always consider a product that offers data backup and restore features as well as advanced security that allows locating a missing device and remotely locking that device in case of loss or theft.
  • Awareness should come from personal end. Need to educate family members and pay attention to children’s online activities. It is necessary to discuss with the family members including children’s which information is appropriate to share online and which is not, such as addresses, phone numbers, and other private information.
  • It is recommended always download apps from a reputable app store. Third-party applications can be malicious and need to be careful to download any apps.
  • Backing up of personal handheld devices like; mobile, laptop, Tab etc. is necessary to protect the confidential data.
  • In case of removable storage device, such as a flash drive or portable hard drive, always use encrypted USB stick or protected portable hard drive to protect the sensitive data if the device lost or stolen