Data security cannot be ignored to protect Oracle data from leakage

Source: Internet
Author: User

The Internet has proved to be the most effective way to share information since the first submarine cable laying across the Atlantic Ocean, costing up to $2 million a day in 1866. This cross-Atlantic submarine cable is the world's first network, reducing the speed of global communications from 2 days (based on the Victoria steam engine) to just a few seconds. This original signal transmission experiment brought about the world's information revolution, and the emergence of ACSCII encoding code in the 19th century was developed on the basis of the Morse code.

Subsequently, companies represented by Western Union began selling telegraph services, which allowed people to transmit information anywhere in the world through text.

No cost, no responsibility

The easy-to-use and cost-free Internet directly threatens Oracle databases configured online, especially for poor countries that do not respect intellectual property rights.

Oracle online data is often threatened. Some data collectors write "Hoovers" (a data collection tool) to simulate online database processing to obtain valuable information. Major Oracle online customers such as eBay (e-commerce website company) have to block "Hoovers" to prevent data theft, but scammers are constantly changing, try your best to steal some of your valuable online information. We can also see some internal data security incidents, such as the significant loss caused by data loss of Marriott International Hotel Group.

For companies that focus on internal security, experts suggest that they monitor and, if necessary, modify their internal processing and data access control methods. Oltsik said, "It is not commendable to steal tapes, but it is the most effective method of attack. Many companies will think of preventing hackers who directly access their internal servers, however, if their company's internal security measures are weak, data thieves can take a box of tapes directly.

However, the lack of intellectual property protection has changed the information distribution. The original world wide web of the exclusive nature disappears, and the Free bandwidth model has replaced the Western Union to transmit a large amount of valuable information. Online thieves can digitize and sell best-selling books, and instantly download and steal publications from anywhere on the Internet. Worse, online hackers are attacking databases and stealing data.

Internet: the market for theft in the 21st Century

Intellectual property theft has become an epidemic, and the writer Steven King has lost millions of dollars in its digital best-selling book and its free online publishing. Even the most cautious publishers are risking piracy. My own book, Oracle 10g Application Server Management Manual, was also stolen and sold on eBay for only $6.5. The issuer cannot arrest or sue the theft.

However, for those who dare to make their online Oracle data easily accessible, their situation is even more dangerous. Some of the company's data is stolen by foreigners.

It takes hundreds of thousands of dollars to drive the arrest of intellectual property theft, and scammers know that small companies do not have the money to deal with them, unless they are a company with hundreds of millions of dollars. Generally, American publishers seldom resort to law against global Oracle data theft. As a result, thieves will not worry about being arrested or even imprisoned when stealing Oracle data.

Sooner or later, this problem may be more serious. traditional publishers may suffer bankruptcy, and their high-quality articles are becoming thick junk or messy blogs. Only the powerful protection of intellectual property rights worldwide can protect our information from large-scale theft.

Increasing number of database administrators for data security

Compared with the past, Oracle Database administrators must know more ways to steal company data. As an Oracle database manager, I found various data theft methods. Then I published the data security guidelines for all remote database access operations:

Internal work-many remote database administrators abroad have stolen all the data and used viruses to absorb new data and Email them overseas. Others also include H-1b visa staff who may steal Oracle data and send it to areas outside of China legally not pursued.

External threats-even if Oracle itself provides security protection, some may still apply for a legal database account and use virus programs such as Trojans to monitor and obtain data.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.