Database Security


This chapter introduces you to the threat of database attacks. It uses real-world examples to point out reasons why attackers were successful. We’re not presenting the examples to highlight security flaws of the victimized organizations. Instead, we use these examples to illustrate the common weak points of many organizations. These examples should provide you with facts that let you identify security weaknesses and fix them.

This chapter explains why you need effective database security measures. It also helps you gain senior management support for improved measures. This chapter also lays a foundation for technical ...

Get Oracle Database 12c PL/SQL Advanced Programming Techniques now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.