Database Reference
In-Depth Information
The following is a screenshot of the Applications Manager security page:
The tightening of controls should be done at all levels of the IT Infrastructure.
• Database Tier
• Applications Tier
• Operating Environment Tier
Database tier
We can implement better controls at the database tier by restricting the other
network nodes that the database listener will listen to and restrict the port
numbers on which it will listen.
 
Search WWH ::




Custom Search