Unit IV Database Security
Unit IV Database Security
DATABASE SECURITY
Need for database security – SQL Injection Attacks – The Injection Technique – SQL
Attack Avenues and Types
To prevent a SQL injection attack from occurring, businesses can follow these
practices:
1. Train employees on prevention methods--
It's important that IT teams -- including DevOps, system administrators and
software development -- receive proper security training to understand how SQLi
attacks happen and how they can be prevented in web applications
2. Don't trust user input--
Any user input provided in a SQL query increases the likelihood for a successful
SQL injection.
The best way to mitigate this type of risk is to put security measures around user
input.
3. Use an allow list instead of a block list--
Validating and filtering user input via an allowlist, as opposed to a blocklist, is
recommended because cybercriminals can usually bypass a blocklist.
This is because a blocklist includes a list of all the applications or executables that
might pose a threat to the network.
Therefore, everything on the network can operate besides the items on the
blocklist.
Unfortunately, thousands of new malware and virus samples are created every
day, and it's impossible for administrators to keep the blocklists updated with
newer attack variants and zero-day vulnerabilities, so a security breach is entirely
possible before the list is updated.
4. Perform routing updates, and use the newest version of applications--
One of the most common SQL injection vulnerabilities is outdated software.