8.4. Wrapping Up

In this chapter you have looked at a couple of ways that virtual private databases can be defeated. The same ideas, especially the raw file access method, can be applied to Oracle Label Security and the new Database Vault product. Encryption of data should be considered as a must for highly sensitive applications.

Get The Oracle® Hacker's Handbook: Hacking and Defending Oracle now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.