Database Reference
In-Depth Information
Summary
Following the topic's paradigm, "identify the problem first and propose the adequate solu-
tion (pattern)", we spent a lot of time discussing security threats, risks, and attack types. We
only regret that, in this format, we cannot elaborate more on hackers' techniques. Neverthe-
less, forewarned is forearmed. You are now equipped with some of the most common and
dangerous tricks. You have a list of essential Oracle tools and fundamentally, you know
how to combine them in defensive and preventive patterns.
Practically, any attacks start from "reconnaissance missions" to obtain the critical informa-
tion from regular or fault responses, error logs, dumps, and so on. Therefore, the next
chapter will be dedicated to fault handling frameworks and will logically continue the se-
curity frameworks requirements in regard to error catching, shielding, prevention, and re-
covery.
Search WWH ::




Custom Search