Call for Oracle support & training (800) 766-1884
Free Oracle Tips

Home
Corporate Oracle Training
Custom Oracle Training
Oracle New Features Training
Advanced Oracle DBA Classes
Oracle Tuning Courses
Oracle Tips & Tricks
Oracle Training Links
Oracle Training Links
Oracle Training Links

We are top for USA Oracle Training Clients

 

Free Oracle Tips


 
HTML Text AOL

Free Oracle App Server Tips


 
HTML Text

Oracle support

Oracle training

Oracle tuning

Rednecks!

Remote Oracle

Custom Oracle Training

 

   
  Oracle Tips by Burleson

Chapter 4 General Oracle Security

can be a very effective tool to discourage malicious users from getting what they want.

Think of an example – if a burglar breaks into your house to rob the family safe, would he or she look inside the laundry closet? Probably not. The thief will look for a box-like object that may appear similar to the thief’s image of the safe. If the safe was designed to look like, say, a dirty clothes hamper, with some actual dirty underwear on the top, the thief would probably never be able to guess that, and thus the safe will be indeed exactly that - safe. (Now everybody knows where the safe is in my house! However, I assure you, there is nothing of value inside, just a few stones my wife collects!)

A similar concept can be applied to database objects, too. A hacker will look for a table named credit_card or something similar. If the credit card numbers are stored in a table named process_data, the hacker will most likely ignore it. However, all the legitimate users will know exactly where to find the data. This technique not only applies to table names, but to column names as well, e.g. the credit card numbers are represented by a column name PROC_DATA_VALUE, or something similar.

This technique of hiding an object behind a meaningless name is adapted from the concept of camouflage in everyday life. Although it may be a little complex to use, in a small development group this can easily be implemented. The added advantage of this object masquerading as a form of security is that it protects against the prying eyes of internal employees who have
 

The above text is an excerpt from:

Oracle Privacy Security Auditing

The Final Word on Oracle Security

 

This is the only authoritative book on Oracle Security, Oracle Privacy, and Oracle Auditing written by two of the world’s leading Oracle Security experts.

This indispensable book is only

$39.95

 and has an immediate download of working security scripts:

 

http://rampant-books.com/book_2003_2_audit.htm



 
 
 
 

Oracle performance tuning book

 

 

Oracle performance tuning software

 
Oracle performance tuning software
 
Oracle performance Tuning 10g reference poster
 
Oracle training in Linux commands
 
Oracle training Excel
 
 
 
 

 

email BC:


Copyright © 1996 -  2014 by Burleson Inc. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation.