In case the authentication of the standby server is breached so that a malicious user purporting to be the standby server can spoof data, the transaction log data can be encrypted to prevent it from being deciphered. The transparent data encryption feature is used to encrypt the data.
See
Refer to "Protecting Storage Data Using Transparent Data Encryption" in the Operation Guide for details.