Chapter 8. Security
By Anton Nielsen
Throughout 2009 and 2010 WikiLeaks published nearly a half-million sensitive or classified US Government documents. The story of how WikiLeaks obtained these documents and the subsequent chain of events, from Denial of Service (DoS) attacks to social engineering, reads like a technology hacking mystery novel. Events are still unfolding, but a deeper look at the techniques, technology, and policies involved will enlighten anyone interested in how sensitive data can be compromised or even altered. As far as I know, none of the systems involved in these events used Oracle Application Express, but the same techniques, combined with poor policies, could certainly be applied to APEX or virtually any digital technology. ...
Get Expert Oracle Application Express now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.