Securing an application environment involves a set of three components:
- Technology infrastructure security, which involves securing the network and host
- Operating environment security, which involves securing the database and operating system
- Application security, which involves securing the actual application. This includes user access management and role-based access control (RBAC).
It only takes one mouse click to send sensitive data all over the world.
For top 10 Security vulnerabilities, MyIQ users can visit this article
Application Security Using the Role-based Access Control Model
This section revisits the RBAC model and describes its implementation in the Oracle E-Business Suite.