Chapter 2. Securing the Network and Data in Transit

In this chapter we will cover the following topics:

  • Hijacking an Oracle connection
  • Using OAS network encryption for securing data in motion
  • Using OAS data integrity for securing data in motion
  • Using OAS SSL network encryption for securing data in motion
  • Encrypting network communication using IPSEC
  • Encrypting network communication with stunnel
  • Encrypting network communication with SSH tunneling
  • Restricting the fly listener administration using ADMIN_RESTRICTION_LISTENER parameter
  • Securing external program execution (EXTPROC)
  • Controlling the client connections using the TCP.VALIDNODE_CHECKING listener parameter

Introduction

As most of the applications that are using Oracle Databases are two or three tiered, ...

Get Oracle 11g Anti-hacker's Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.