SQL INJECTION: THE LONGEST RUNNING SEQUEL IN PROGRAMMING HISTORY

Sábháilte in:
Sonraí bibleagrafaíochta
Foilsithe in:The Journal of Digital Forensics, Security and Law : JDFSL vol. 12, no. 2 (2017), p. 97
Príomhchruthaitheoir: Horner, Matthew
Rannpháirtithe: Hyslip, Thomas
Foilsithe / Cruthaithe:
Association of Digital Forensics, Security and Law
Ábhair:
Rochtain ar líne:Citation/Abstract
Full Text
Full Text - PDF
Clibeanna: Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!

MARC

LEADER 00000nab a2200000uu 4500
001 2035633714
003 UK-CbPIL
022 |a 1558-7215 
022 |a 1558-7223 
035 |a 2035633714 
045 2 |b d20170401  |b d20170630 
084 |a 114516  |2 nlm 
100 1 |a Horner, Matthew  |u Norwich University Northfield, VT mhorner@norwich.edu 
245 1 |a SQL INJECTION: THE LONGEST RUNNING SEQUEL IN PROGRAMMING HISTORY 
260 |b Association of Digital Forensics, Security and Law  |c 2017 
513 |a Journal Article 
520 3 |a One of the risks to a company operating a public-facing website with a Structure Query Language (SQL) database is an attacker exploiting the SQL injection vulnerability. An attacker can cause an SQL database to perform actions that the developer did not intend like revealing, modifying, or deleting sensitive data. This can cause a loss of confidentiality, integrity, and availability of information in a company's database, and it can lead to severe costs of up to $196,000 per successful injection attack (NTT Group, 2014). This paper discusses the history of the SQL injection vulnerability, focusing on: * How an attacker can exploit the SQL injection vulnerability * When the SQL injection attack first appeared * How the attack has changed over the years * Current techniques to defend adequately against the attack The SQL injection vulnerability has been known for over seventeen (17) years, and the countermeasures are relatively simple compared to countermeasures for other threats like malware and viruses. The focus on security-minded programming can help prevent a successful SQL injection attack and avoid loss of competitive edge, regulatory fines and loss of reputation among an organization's customers. 
610 4 |a J C Penney Co Inc 
653 |a Network security 
653 |a Hackers 
653 |a Structured Query Language-SQL 
653 |a Databases 
653 |a Websites 
653 |a Cybercrime 
653 |a Companies 
653 |a Prevention programs 
653 |a Vulnerability 
653 |a Confidentiality 
653 |a Morality 
653 |a Fines and penalties 
653 |a Computer viruses 
653 |a Customers 
653 |a Consumers 
700 1 |a Hyslip, Thomas  |u Norwich University Northfield, VT thyslip@norwich.edu 
773 0 |t The Journal of Digital Forensics, Security and Law : JDFSL  |g vol. 12, no. 2 (2017), p. 97 
786 0 |d ProQuest  |t Criminal Justice Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/2035633714/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/2035633714/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/2035633714/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch