Chapter Review

We took our key exchange and data encryption concepts that we learned in Chapter 6 and applied them to a specific Oracle application, the HR schema. Is this one of those great moments in science? Perhaps not, but it is a milestone, and a springboard for us into bigger and better things in regard to our application security. We have successfully encrypted our sensitive application data as it traversed the network.

We built structures for error logging, specifically to track errors and events involving our application security processes, no matter what client application is currently using them. Additionally, we built a trigger to automatically manage the logs, discarding records over 45 days old.

There was a lot of code, both PL/SQL ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.