IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases

SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases
View Sample PDF
Author(s): Theodoros Tzouramanis (University of the Aegean, Greece)
Copyright: 2009
Pages: 11
Source title: Database Technologies: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): John Erickson (University of Nebraska, Omaha, USA)
DOI: 10.4018/978-1-60566-058-5.ch128

Purchase

View SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases on the publisher's website for pricing and purchasing information.

Abstract

This chapter focuses on the SQL code poisoning attack. It presents various ways in which a Web database can be poisoned by malicious SQL code, which can result in the compromise of the system. Subsequently, techniques are described for the detection of SQL code poisoning and a number of lockdown issues that are related to this type of attack are discussed. This chapter also reviews security mechanisms and software tools that protect Web applications against unexpected data input by users; against alterations of the database structure; and against the corruption of data and the disclosure of private and confidential information, all of which are owed to the susceptibility of these applications to this form of attack.

Related Content

. © 2019. 19 pages.
. © 2019. 44 pages.
. © 2019. 23 pages.
. © 2019. 18 pages.
. © 2019. 11 pages.
. © 2019. 18 pages.
. © 2019. 31 pages.
Body Bottom