O'Reilly logo

Oracle Database 12c PL/SQL Advanced Programming Techniques by John Harper, Michael McLaughlin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image

CHAPTER7

Database Security

Purpose

This chapter introduces you to the threat of database attacks. It uses real-world examples to point out reasons why attackers were successful. We’re not presenting the examples to highlight security flaws of the victimized organizations. Instead, we use these examples to illustrate the common weak points of many organizations. These examples should provide you with facts that let you identify security weaknesses and fix them.

This chapter explains why you need effective database security measures. It also helps you gain senior management support for improved measures. This chapter also lays a foundation for technical ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required