SQL Injection Impact on Web Server and Their Risk Mitigation Policy Implementation Techniques: An Ultimate solution to Prevent Computer Network from Illegal Intrusion

Na minha lista:
Detalhes bibliográficos
Publicado no:International Journal of Advanced Research in Computer Science vol. 8, no. 3 (Mar 2017), p. n/a
Autor principal: Sadotra, Parveen
Outros Autores: Sharma, Chandrakant
Publicado em:
International Journal of Advanced Research in Computer Science
Assuntos:
Acesso em linha:Citation/Abstract
Full Text - PDF
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!

MARC

LEADER 00000nab a2200000uu 4500
001 1901457619
003 UK-CbPIL
022 |a 0976-5697 
035 |a 1901457619 
045 2 |b d20170301  |b d20170331 
084 |a 198728  |2 nlm 
100 1 |a Sadotra, Parveen 
245 1 |a SQL Injection Impact on Web Server and Their Risk Mitigation Policy Implementation Techniques: An Ultimate solution to Prevent Computer Network from Illegal Intrusion 
260 |b International Journal of Advanced Research in Computer Science  |c Mar 2017 
513 |a Journal Article 
520 3 |a SQL Injection attacks pose a very serious security threat to Web applications and web servers. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive and important information these databases contain. Although researchers and security professionals have proposed various methods to address the SQL injection problem but current approaches either fail to address the full scope of the problem or have limitations that prevent their use and adoption. Many researchers and security professionals are familiar with only a subset of the wide range of techniques available to attackers who are trying to take advantage of SQL injection vulnerabilities. As a result, many solutions proposed in the literature address only some of the issues related to SQL injection. To address this problem, we are presenting an extensive review of the different types of SQL injection attacks known to date. Also for each type of attack, we provide descriptions and examples of how attacks of that type could be performed. We also presented and analyze existing detection and prevention techniques against SQL injection attacks. 
653 |a Researchers 
653 |a Intrusion 
653 |a Security management 
653 |a Applications programs 
653 |a Computer networks 
653 |a Query languages 
653 |a Databases 
653 |a Servers 
653 |a Cybersecurity 
700 1 |a Sharma, Chandrakant 
773 0 |t International Journal of Advanced Research in Computer Science  |g vol. 8, no. 3 (Mar 2017), p. n/a 
786 0 |d ProQuest  |t Advanced Technologies & Aerospace Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/1901457619/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/1901457619/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch