11.07.2015 Views

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• SQL Injection Attacks• Defending Against SQL Injection Attacks• SQL Manipulation• Code Injection Attack• Function Call Injection Attack• Buffer Overflow and Other Vulnerabilities• DBMS_SQL in PL/SQL• Protecting DBMS_SQL in PL/SQL• Types of Database Vulnerabilities/ Attacks• Establishing Security Policies• Password Management Policyo Password Management policy: Password History• Auditing Policy• Oracle Policy Manager• Oracle Label Security (OLS)• Create an Oracle Label Security Policyo Step 1: Define the Policyo Step 2: Define the Components of the Labelso Step 3: Identify the Set of Valid Data Labelso Step 4: Apply Policy to Tables and Schemaso Step 5: Authorize Userso Step 6: Create and Authorize Trusted Program Units (Optional)o Step 7: Configure Auditing (Optional)• Using Oracle Label Security with a Distributed Database• Oracle Identity Management• Security Tools• Oracle <strong>Secure</strong> Backup Tool• ObfuscationPage 39http://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!