Results for network encryption


1 to 20 of 5611 results. Prev  Next
Results per page:   20  | 40 | 60


Database Security Guide, 10g Release 2 (10.2)

Developing Applications Using Data Encryption

Securing Sensitive Informationaccess control to limit what users can see and do Auditing for accountability Network encryption to … do anything special to enable SSL encryption. Oracle has provided network encryption between … protect the confidentiality of sensitive data in transmission Encryption is an important

Database Security Guide, 10g Release 2 (10.2)

Developing Applications Using Data Encryption

Key StorageKey storage is one of the most important, yet difficult, aspects of encryption. To recover data … Own Keys Using Transparent Database Encryption Storing the Keys in the Database Storing the keys in … accessing encrypted data. An all-privileged DBA could still access tables containing encryption keys … column. However, anyone with

Database Security Guide, 10g Release 2 (10.2)

Developing Applications Using Data Encryption

Key Transmission, a snooper could grab the key as it is being transmitted. Use of network encryption, such as that

Database Advanced Security Administrator's Guide, 10g Release 2 (10.2)

Configuration and Administration Tools Overview

2.1 Network Encryption and Strong Authentication Configuration ToolsOracle Net Services can be configured to encrypt data using standard encryption algorithms, and for

Database Advanced Security Administrator's Guide, 10g Release 2 (10.2)

Configuring Network Data Encryption and Integrity for Thin JDBC Clients

5.1 About the Java ImplementationThe Java implementation of Oracle Advanced Security provides network encryption and integrity

Database PL/SQL Packages and Types Reference, 10g Release 2 (10.2)

DBMS_OBFUSCATION_TOOLKIT

Operational Notesconnection between the client and the server, the connection must be protected by using network encryption … Administrator's Guide for information about configuring and using network encryption for Oracle Net … , it is crucial that you use network encryption, such as that provided by

Spatial Topology and Network Data Models, 10g Release 2 (10.2)

Spatial Topology and Network Data Models - Contents

ContentsDocumentation Accessibility Related Documents Conventions What's New in the Topology and Network Data … SDO_NET_MEM Package for Network Editing and Analysis Bidirected Links Cost Computation by a PL/SQL … SDO_TOPO_MAP.VALIDATE_TOPOLOGY Part II Network Data Model 5 Network Data Model Overview 5.1 Introduction to

Database PL/SQL Packages and Types Reference, 10g Release 2 (10.2)

DBMS_CRYPTO

Operational Notesnetwork encryption. Otherwise, the key is vulnerable to capture over the wire. Although DBMS_CRYPTO … Database Advanced Security Administrator's Guide for information about configuring network encryption and … Code (MAC) Functions About Generating and Storing Encryption Keys Conversion Rules When to

Database Administrator's Guide, 10g Release 2 (10.2)

Creating an Oracle Database

Enabling Transparent Data EncryptionEnabling Trans parent Data Encryption Transparent data encryption is a feature that enables … encryption of database columns before storing them in the datafile. If users attempt to circumvent the … , transparent data encryption prevents such users from viewing sensitive information. Users who have the … transparent

Database Advanced Security Administrator's Guide, 10g Release 2 (10.2)

Introduction to Oracle Advanced Security

1.2.1 Data Encryptionnetwork data transmissions: RC4 Encryption: DES Encryption: Triple-DES Encryption: Advanced … Encryption Standard: Selecting the network encryption algorithm is a user configuration option, providing … encryption algorithm. Using a secret, randomly-generated

Database Error Messages, 10g Release 2 (10.2)

ORA-12700 to ORA-19380

ORA-16193: Primary and standby network encryption mismatchset it up identically on both primary and standby. Restart primary and/or standby. ORA-16193: Primary and standby network encryption mismatch … Cause: Standby wants sqlnet network integrity for redo shipment which is not configured properly at … the primary. Action: Check sqlnet.ora documentation regarding how to setup network

Database Advanced Security Administrator's Guide, 10g Release 2 (10.2)

Data Encryption and Integrity Parameters

A.1 Sample sqlnet.ora FileNetwork Encryption #ASO Encryption sqlnet.encryption_server=accepted sqlnet.encryption_client=requested … Advanced Security encryption and data integrity parameters. Trace File Setup #Trace file setup … trace_level_server=16 trace_level_client=16 trace_directory_server=/orant/network/trace … trace_directory_client=/orant/network/trace

Database Security Guide, 10g Release 2 (10.2)

Security Policies

Username Account Statusnetwork encryption. H arden the operating system. Harden the host operating system by disabling all … Security (an option to the Enterprise Edition of Oracle Database) with network authentication services … messages. UTL_TCP 1 This package permits outgoing network connections to be established by the … database

Database Administrator's Guide, 10g Release 2 (10.2)

Overview of Administering an Oracle Database

Network AdministratorsSome sites have one or more network administrators. A network administrator, for example … Services Administrator's Guide for information about the duties of network administrators. See Also … : Part VII, \"Distributed Database Management\", for information on network administration in a distributed environment

Database New Features Guide, 10g Release 2 (10.2)

Oracle Database 10g Documentation

2.1.1 Oracle Database 10g DocumentationSpatial Topology and Network Data Models Developer's Guide B14256-01 Provides usage and reference … information about the topology data model and network data model capabilities of Oracle Spatial. Oracle … topology and network data models, and with MapView, which is packaged with Oracle Application … Oracle Technology Network

Database Security Guide, 10g Release 2 (10.2)

Developing Applications Using Data Encryption

Data Encryption ChallengesEven in cases where encryption can provide additional security, come with associated technical … challenges, as described in the following sections: Encrypting Indexed Data Key Generation Key Transmission Key Storage Changing Encryption Keys BLOBS

Database Security Guide, 10g Release 2 (10.2)

Authentication Methods

Password Encryption While ConnectingPasswords are always automatically and transparently encrypted during network (client/server and … server/server) connections, using AES (Advanced Encryption Standard) before sending them across the … network. See Also: For more information about encrypting passwords in network systems, refer to

Database Installation Guide for Microsoft Windows (x64), 10g Release 2 (10.2)

What's New in Oracle Database for Windows?

Database Password EncryptionWhen a user attempts a remote login to an Oracle Database 10 g Release 2 (10.2) database, the password is automatically encrypted before it is sent to the remote database. See Also: \"Administering a Database on Windows\" in Oracle Database Platform Guide for Microsoft Windows (x64)

Database Security Guide, 10g Release 2 (10.2)

Developing Applications Using Data Encryption

Principles of Data EncryptionWhile there are many good reasons to encrypt data, there are many reasons not to. Encryption does … describe some misconceptions about encryption of stored data: Principle 1: Encryption Does Not Solve … Access Control Problems Principle 2: Encryption Does Not Protect Against a Malicious DBA Principle 3: Encrypting Everything

Database Installation Guide for Microsoft Windows (32-Bit), 10g Release 2 (10.2)

What's New in Oracle Database for Windows?

Database Password EncryptionWhen a user attempts a remote login to an Oracle Database 10g Release 2 (10.2) database, the password is automatically encrypted before it is sent to the remote database. See Also: \"Administering a Database on Windows\" in Oracle Database Platform Guide for Microsoft Windows (32-Bit)


Was this page helpful?