Abstract

This chapter discusses the security of one of the most popular database products for Web-based development—Microsoft's SQL Server 2000. The chapter begins by a brief outline of the history of SQL Server and investigating the different editions that are available. It provides an overview of the entire SQL Server security architecture and explains how the pieces work together. The way attackers identify, penetrate, and escalate privileges in a SQL Server environment is investigated in the chapter. The chapter identifies all tools and techniques that potential attackers may use to turn the servers into theirs. It then analyzes how good SQL Server security can be undermined by poor application development. SQL injection techniques and SQL Server's own special weaknesses are also discussed in detail. The chapter concludes with a discussion on the defensive weapons and describes how to leverage them against adversaries now and in the future.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.