Yearly Archive: 2012

Oracle Database Security – Part 2

This is part 2 of a series of posts aiming to analyze the real world security challenge of the Oracle database. Part 1 discussed the potential risks to the database, and this part will discuss the methods likely to be employed by each individual to compromise the data. So How will the breach occur? While […]

Read More

Oracle Database Security – Part 1

Securing any system is a complex task, but the Oracle database poses special challenges. This series of posts aims to analyze the problem and come to conclusions about what can and should be done in real world environments. The first step in security analysis is risk assessment, so part 1 will focus on: Who poses […]

Read More