Error or Unauthorized Access Attempt

Error handling, system changes, and exceptions are discussed together in this section. This is quite deliberate because all three areas cover the entire application deployment from operating system to application suite components. We are not looking for normal errors or issues, but rather specific attempts to gain access or produce methods to see hidden data (for example, buffer overflows).

Within this section I am not going to show specific “hacking” methods, because most do not work anyway (and if they did, this would put Oracle customers at risk). Instead, we will discuss what to look for and what to do when issues arise.

Log File Monitoring

Table 6-3 provides the log files that should be monitored, not ...

Get Oracle E-Business Suite Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.