On an almost daily basis, we hear stories of yet another computer system that has been compromised by someonea curious teenager, a disgruntled employee, or a corporate or political spy. We are baffled and bemused by the number of "hackers" who have been able to get into systems that have, up until now, been viewed as invulnerable. Government computers, corporate computers, and university systems are all fair game. It would appear that no system is completely safe.
In this book, you will find tactics, methods , and approaches to help you better protect your Oracle database and your computer systems as a whole. Our objective in writing this book is to provide you with the information and tools you need to ensure that your data remains safe. We emphasize the tools provided within the basic Oracle software that can help you build as complete a security system as your company requires. We are not here to sell you extra products. However, in the last chapter of the book, we do provide a brief overview of three extra-cost Oracle products: Trusted Oracle, the Advanced Networking Option, and the Oracle Application Server (formerly referred to as the Web Application Server).
The book will explain how to implement basic security concepts and more complex security actions from both a database and an applications perspective. We will also examine the auditing of the database and application areas. Since today more and more emphasis is being placed on World Wide Web-enabled interaction with the Oracle database, we'll also touch on methods for securing both the database and applications for Internet and Web interaction.