srijeda, 16. listopad 2019., 11:20
We believe so much in technology, that we stopped believing in people. Companies are buying software to resolve their security problems, but managers tend to forget, that software itself can’t resolve anything - a key thing is proper implementation. And whoever has access to the operating system, might get access to your data. Even encrypted data. During this session, I will show a basic implementation of Oracle Database Vault and Transparent Data Encryption and how someone with OS access could bypass both protections to order to see or event modify your protected data.