Chapter 2. Securing the Network and Data in Transit
In this chapter we will cover the following topics:
- Hijacking an Oracle connection
- Using OAS network encryption for securing data in motion
- Using OAS data integrity for securing data in motion
- Using OAS SSL network encryption for securing data in motion
- Encrypting network communication using IPSEC
- Encrypting network communication with stunnel
- Encrypting network communication with SSH tunneling
- Restricting the fly listener administration using ADMIN_RESTRICTION_LISTENER parameter
- Securing external program execution (EXTPROC)
- Controlling the client connections using the TCP.VALIDNODE_CHECKING listener parameter
Introduction
As most of the applications that are using Oracle Databases are two or three tiered, ...
Get Oracle 11g Anti-hacker's Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.