Abstract
There are often multiple reasons why an Oracle database may be attacked. An attacker may see an Oracle database simply as an easy target to gain access to a company's other IT infrastructure. Unfortunately, because Oracle is a very complex product that requires an enormous amount of configuration, often gaps are created in the security model used to protect the data held within the database.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Pete Finnigan
About this chapter
Cite this chapter
Finnigan, P. (2018). Data Breach. In: Oracle Incident Response and Forensics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3264-4_1
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3264-4_1
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3263-7
Online ISBN: 978-1-4842-3264-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books