Oracle CSO:软件应该自我保护
欢迎进入Oracle社区论坛,与200万技术人员互动交流 >>进入 甲骨文公司安全主任Mary Ann Davidson说,将来,应用软件应该保护它们自己不受攻击。 今天上午在开放式的AusCERT 2007会议上,Davidson说,应用软件应该更像美国水兵一样。 “每一个水兵打仗――不
欢迎进入Oracle社区论坛,与200万技术人员互动交流 >>进入
甲骨文公司安全主任Mary Ann Davidson说,将来,应用软件应该保护它们自己不受攻击。
今天上午在开放式的AusCERT 2007会议上,Davidson说,应用软件应该更像美国水兵一样。
“每一个水兵打仗――不管你是正式的还是实习的,对每一个水兵来说,首要的任务就是成为一名真正的水兵,这就意味着他们应该学会如何保护他们自己。这是一种精神,我认为在这个新世界中我们确实需要这样的精神。
“实际上,为什么我们需要所有的这些安全产品呢――这是因为软件不能自我保护。”Davidson说。
Davidson也建议开发商尽可能的将他们解决bug的方法告诉大家,这样才能避免出现相同的bug.
“也许你不能证明这个产品可以避免攻击,但是至少能证明你在开发中使用了这些工具――甚至能证明开发人员的水平,同时也能证明软件生命周期的类型。”Davidson说。
对安全认识的不充足和代码的臃肿也是产生攻击的一个原因,但是“就安全方面来说,它需要产品知道如何保护它们自身的安全,因为产品知道它们自身希望达到什么样的安全效果。”她说。
据Davisdon说,开发人员应该根据明确的目的创建代码,不需要考虑每一个未来的可能性。
“开发人员是非常有创造性的,经常会考虑一些在未来世界中才会用到的方法……但是也正是因为允许了一些未来才可能发生的事件,所以才会导致他们受到更多的攻击。”她说。
对黑客来说数据库就是“圣杯”
在介绍Davidson上台之前,AusCERT总经理Graham Ingram指出了数据库软件安全的重要性。
“我们所掌握的数据库,包括名字,地址和一些信用卡的资料,这些资料对于黑客们来说都是非常宝贵的,自然而然的,它们就成了黑客攻击的目标。
“在很多情况下,我们不能不考虑数据库软件的安全性,也就是要考虑对圣杯的攻击。”Ingram说。

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Data import method: 1. Use the SQLLoader utility: prepare data files, create control files, and run SQLLoader; 2. Use the IMP/EXP tool: export data, import data. Tip: 1. Recommended SQL*Loader for big data sets; 2. The target table should exist and the column definition matches; 3. After importing, data integrity needs to be verified.

Creating an Oracle table involves the following steps: Use the CREATE TABLE syntax to specify table names, column names, data types, constraints, and default values. The table name should be concise and descriptive, and should not exceed 30 characters. The column name should be descriptive, and the data type specifies the data type stored in the column. The NOT NULL constraint ensures that null values are not allowed in the column, and the DEFAULT clause specifies the default values for the column. PRIMARY KEY Constraints to identify the unique record of the table. FOREIGN KEY constraint specifies that the column in the table refers to the primary key in another table. See the creation of the sample table students, which contains primary keys, unique constraints, and default values.

To query the Oracle tablespace size, follow the following steps: Determine the tablespace name by running the query: SELECT tablespace_name FROM dba_tablespaces; Query the tablespace size by running the query: SELECT sum(bytes) AS total_size, sum(bytes_free) AS available_space, sum(bytes) - sum(bytes_free) AS used_space FROM dba_data_files WHERE tablespace_

Use the ALTER TABLE statement, the specific syntax is as follows: ALTER TABLE table_name ADD column_name data_type [constraint-clause]. Where: table_name is the table name, column_name is the field name, data_type is the data type, and constraint-clause is an optional constraint. Example: ALTER TABLE employees ADD email VARCHAR2(100) Add an email field to the employees table.

Solutions to Oracle cannot be opened include: 1. Start the database service; 2. Start the listener; 3. Check port conflicts; 4. Set environment variables correctly; 5. Make sure the firewall or antivirus software does not block the connection; 6. Check whether the server is closed; 7. Use RMAN to recover corrupt files; 8. Check whether the TNS service name is correct; 9. Check network connection; 10. Reinstall Oracle software.

Oracle garbled problems can be solved by checking the database character set to ensure they match the data. Set the client character set to match the database. Convert data or modify column character sets to match database character sets. Use Unicode character sets and avoid multibyte character sets. Check that the language settings of the database and client are correct.

Oracle provides multiple deduplication query methods: The DISTINCT keyword returns a unique value for each column. The GROUP BY clause groups the results and returns a non-repetitive value for each group. The UNIQUE keyword is used to create an index containing only unique rows, and querying the index will automatically deduplicate. The ROW_NUMBER() function assigns unique numbers and filters out results that contain only line 1. The MIN() or MAX() function returns non-repetitive values of a numeric column. The INTERSECT operator returns the common values of the two result sets (no duplicates).

Oracle View Encryption allows you to encrypt data in the view, thereby enhancing the security of sensitive information. The steps include: 1) creating the master encryption key (MEk); 2) creating an encrypted view, specifying the view and MEk to be encrypted; 3) authorizing users to access the encrypted view. How encrypted views work: When a user querys for an encrypted view, Oracle uses MEk to decrypt data, ensuring that only authorized users can access readable data.
