SQL INJECTION: THE LONGEST RUNNING SEQUEL IN PROGRAMMING HISTORY
Sábháilte in:
| Foilsithe in: | The Journal of Digital Forensics, Security and Law : JDFSL vol. 12, no. 2 (2017), p. 97 |
|---|---|
| Príomhchruthaitheoir: | |
| Rannpháirtithe: | |
| Foilsithe / Cruthaithe: |
Association of Digital Forensics, Security and Law
|
| Ábhair: | |
| Rochtain ar líne: | Citation/Abstract Full Text Full Text - PDF |
| Clibeanna: |
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 2035633714 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 1558-7215 | ||
| 022 | |a 1558-7223 | ||
| 035 | |a 2035633714 | ||
| 045 | 2 | |b d20170401 |b d20170630 | |
| 084 | |a 114516 |2 nlm | ||
| 100 | 1 | |a Horner, Matthew |u Norwich University Northfield, VT mhorner@norwich.edu | |
| 245 | 1 | |a SQL INJECTION: THE LONGEST RUNNING SEQUEL IN PROGRAMMING HISTORY | |
| 260 | |b Association of Digital Forensics, Security and Law |c 2017 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a One of the risks to a company operating a public-facing website with a Structure Query Language (SQL) database is an attacker exploiting the SQL injection vulnerability. An attacker can cause an SQL database to perform actions that the developer did not intend like revealing, modifying, or deleting sensitive data. This can cause a loss of confidentiality, integrity, and availability of information in a company's database, and it can lead to severe costs of up to $196,000 per successful injection attack (NTT Group, 2014). This paper discusses the history of the SQL injection vulnerability, focusing on: * How an attacker can exploit the SQL injection vulnerability * When the SQL injection attack first appeared * How the attack has changed over the years * Current techniques to defend adequately against the attack The SQL injection vulnerability has been known for over seventeen (17) years, and the countermeasures are relatively simple compared to countermeasures for other threats like malware and viruses. The focus on security-minded programming can help prevent a successful SQL injection attack and avoid loss of competitive edge, regulatory fines and loss of reputation among an organization's customers. | |
| 610 | 4 | |a J C Penney Co Inc | |
| 653 | |a Network security | ||
| 653 | |a Hackers | ||
| 653 | |a Structured Query Language-SQL | ||
| 653 | |a Databases | ||
| 653 | |a Websites | ||
| 653 | |a Cybercrime | ||
| 653 | |a Companies | ||
| 653 | |a Prevention programs | ||
| 653 | |a Vulnerability | ||
| 653 | |a Confidentiality | ||
| 653 | |a Morality | ||
| 653 | |a Fines and penalties | ||
| 653 | |a Computer viruses | ||
| 653 | |a Customers | ||
| 653 | |a Consumers | ||
| 700 | 1 | |a Hyslip, Thomas |u Norwich University Northfield, VT thyslip@norwich.edu | |
| 773 | 0 | |t The Journal of Digital Forensics, Security and Law : JDFSL |g vol. 12, no. 2 (2017), p. 97 | |
| 786 | 0 | |d ProQuest |t Criminal Justice Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/2035633714/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/2035633714/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/2035633714/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |