Database Reference
In-Depth Information
Chapter11>java testojs.TestOracleJavaSecure 1234-5678-9012
Domain: ORGDOMAIN, Name: OSUSER
Domain: ORGDOMAIN, Name: OSUSER
osuser
APPUSR
127.0.0.1
OSUSER
OSUSER
HRVIEW_ROLE
Oracle success 2)
100, Steven, King, SKING, 515.123.4567, 2003-06-17 00:00:00, AD_PRES, 24000, null, null, 90
Chapter Review
Our goal in this chapter has been to enhance the security of everything we had built so far. We
accomplished that goal on the following fronts:
We programmed Java to encode the appver user password (connection string).
We obfuscated the Java program that does encoding/decoding.
We accomplished secured data encryption for data being stored in the database—
specifically our lists of connection strings.
We established an administrative role that limits who can update connection
strings for applications.
We moved the application verification processes to a new, hardened Oracle
database instance, apver.
In addition to working toward enhancing the security, we also delved into the following timely
topics:
Securing an Oracle user password by various means
Using the Oracle client wallet
Using Oracle client trace logging
Using Oracle thin client (JDBC) trace logging
Using the Oracle wrap utility to obfuscate Oracle functions
Copying application connection strings from a previous version to the current
application version
Adding other authentication credentials, such as FTP passwords, to our
application connection strings list
Reviewing weaknesses in PUBLIC access to the data dictionary views
Using database links to read data from another database instance
 
Search WWH ::




Custom Search