CS 3340 Disc 2
CS 3340 Disc 2
SQL Injection
A common vulnerability is where the attacker changes database queries by “injecting”
harmful SQL scripts into the data fields.
Explain the countermeasures that can be effectively used to mitigate or prevent major
damages caused by that vulnerability.
Input validation: The system must make sure that all user inputs are strictly checked to
accept only the expected data types.
Pre-made statements: Create SQL queries that separate from muser input to block
malicious injections
Regular Security Testing: Conduct regular penetration tests to test for any
vulnerabilities that can be exploited by SQL Injections (CloudFlare, 2024)
References
UC Berkeley, 2024, How to Protect Against SQL Injection Attacks | Information Security Office
(berkeley.edu)
CloudFlare, 2024, How to prevent SQL injection | Cloudflare