Database, SQL Injection

This article explains about the security issues regarding database SQL injections. It also includes a little tutorial on how these types of attacks work.

The SQL injections attacks pose risks to web applications that depend on a database to generate dynamic content. Hackers can manipulate a web application with this type of an attack by injecting their own SQL commands into those issued by the database itself. The article therefore recommends preventing these types of attacks by verifying the code running on the specific server before any kind of disaster occurs.

There are different ways of testing for SQL injections. The most basic tests would be to evaluate the web application for SQL injection vulnerabilities by using a web browser.

Read more about the security risks on the following link below.

This entry was posted in IT Security, Week 14. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s