Jan 27 2015

How to Change Oracle Enterprise Manager Port Number

Category: Administration,Database SecurityFatih Acar @ 17:29

If you want to change Oracle Enterprise Manager port number, you can use “emca -reconfig ports -DBCONTROL_HTTP_PORT ” command, this is simple. You can use to take security measure for Oracle EM. I will give 1820 as port for Oracle EM as example.

Change Oracle Enterprise Manager Port


Continue reading “How to Change Oracle Enterprise Manager Port Number”

16,343 total views, 14 views today

Tags: Database Administration, Database Security, Oracle Administration, Oracle Security

Dec 23 2014

RMAN Encrypt Backup in Oracle

Category: Backup And Recovery,Database SecurityFatih Acar @ 09:04

You can protect your backups with rman encryption. You have three ways to rman backup encryption. You can use wallet, password or dual mode. I will tell you password protection.

Configure RMAN Backups With Password Protection

rman target /
RMAN> set encryption on identified by ‘yourpassword’ only;

You can backup with backup database command. Do not need to change any backup script.

You can change encryption algorithm on RMAN Configuration.

Show Encryption Algorithm

SQL> select algorithm_id, algorithm_name, algorithm_description, is_default from v$rman_encryption_algorithms;

Change Encryption Algorithm
Continue reading “RMAN Encrypt Backup in Oracle”

17,608 total views, 40 views today

Tags: Database Administration, Database Security, Oracle Administration, Oracle Backup and Restore, RMAN Encrypt Backup

Dec 22 2014

How to Create Oracle Wallet for Encrpytion

Category: Administration,Database SecurityFatih Acar @ 14:35

Oracle Wallet Manager is a password protected stand-alone Java application tool used to maintain security credentials and store SSL related information such as authentication and signing credentials, private keys, certificates, and trusted certificates.

1- Create Wallet Directory

[oracle@testdb ~] cd $ORACLE_HOME
[oracle@testdb db_home] mkdir -p ORA_WALLETS

2- Write Wallet Location Information in sqlnet.ora File

[oracle@testdb ~] cd $ORACLE_HOME/network/admin
[oracle@testdb db_home] vi sqlnet.ora


3- Configure Wallet in Oracle Database
Continue reading “How to Create Oracle Wallet for Encrpytion”

10,926 total views, 2 views today

Tags: Database Administration, Database Security, Oracle Administration, Oracle Security, Oracle Wallet

Apr 29 2013

Disable root SSH Login on Linux Server

Category: Database Security,Linux & Unix,System SecurityFatih Acar @ 10:45

Root user is the most authoritative user on linux operating systems. You can take measure for security with disable root ssh. You can connect to server with other users.

Edit sshd_config

vi /etc/ssh/sshd_config

#LoginGraceTime 2m
#PermitRootLogin yes
#StrictModes yes

Note : “PermitRootLogin yes” is default value. This value allows ssh root login
You have to change parameter and remove # symbol.

#LoginGraceTime 2m
PermitRootLogin no
#StrictModes yes

Edit Port

Note : You can change ssh connection port, then you can provide extra security.

vi /etc/ssh/sshd_config

Change port number


Restart sshd Service

service sshd restart

8,962 total views, 15 views today

Tags: Database Security, System Administration, System Security

Dec 16 2011

Social Engineering Attacks

Category: Database Security,Information Security,System SecurityFatih Acar @ 17:07

All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases. These biases, sometimes called “bugs in the human hardware,” are exploited in various combinations to create attack techniques, some of which are listed here:


Pretexting is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.[4] An elaborate lie, it most often involves some prior research or setup and the use of this information for impersonation (e.g., date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target.
This technique can be used to blame a business into disclosing customer information as well as by private investigators to obtain telephone records, utility records, banking records and other information directly from company service representatives. The information can then be used to establish even greater legitimacy under tougher questioning with a manager, e.g., to make account changes, get specific balances, etc.
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, clergy, insurance investigators — or any other individual who could have perceived authority or right-to-know in the mind of the targeted victim. The pretexter must simply prepare answers to questions that might be asked by the victim. In some cases all that is needed is a voice that sounds authoritative, an earnest tone, and an ability to think on one’s feet.

Diversion theft

Diversion theft, also known as the “Corner Game” or “Round the Corner Game”, originated in the East End of London.
In summary, diversion theft is a “con” exercised by professional thieves, normally against a transport or courier company. The objective is to persuade the persons responsible for a legitimate delivery that the consignment is requested elsewhere — hence, “round the corner”.
With a load/consignment redirected, the thieves persuade the driver to unload the consignment near to, or away from, the consignee’s address, in the pretense that it is “going straight out” or “urgently required somewhere else”.
The “con” or deception has many different facets, which include social engineering techniques to persuade legitimate administrative or traffic personnel of a transport or courier company to issue instructions to the driver to redirect the consignment or load.
Another variation of diversion theft is stationing a security van outside a bank on a Friday evening. Smartly dressed guards use the line “Night safe’s out of order, Sir”. By this method shopkeepers etc. are gulled into depositing their takings into the van. They do of course obtain a receipt but later this turns out to be worthless. A similar technique was used many years ago to steal a Steinway grand piano from a radio studio in London. “Come to overhaul the piano, guv” was the chat line.

Continue reading “Social Engineering Attacks”

10,221 total views, no views today

Tags: Oracle, System Security