Abstract
Throughout 2009 and 2010 WikiLeaks published nearly a half-million sensitive or classified US Government documents. The story of how WikiLeaks obtained these documents and the subsequent chain of events, from Denial of Service (DoS) attacks to social engineering, reads like a technology hacking mystery novel. Events are still unfolding, but a deeper look at the techniques, technology, and policies involved will enlighten anyone interested in how sensitive data can be compromised or even altered. As far as I know, none of the systems involved in these events used Oracle Application Express, but the same techniques, combined with poor policies, could certainly be applied to APEX or virtually any digital technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2011 John Edward Scott, Dietmar Aust, Martin Giffy D’Souza, Doug Gault, Dimitri Gielis, Roel Hartman, Michael Hichwa, Sharon Kennedy, Denes Kubicek, Raj Mattamal, Dan McGhan, Francis Mignault, Anton Nielsen
About this chapter
Cite this chapter
Nielsen, A. (2011). Security. In: Expert Oracle Application Express. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-3513-2_8
Download citation
DOI: https://doi.org/10.1007/978-1-4302-3513-2_8
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-3512-5
Online ISBN: 978-1-4302-3513-2
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books