Abstract
This work exposes a brief review of well-known hacking techniques for programs and websites working with databases. Based on a comprehensive analysis of the main types of SQL attacks, the most profound threats are identified. They include in-band, blind and out-of-band types of SQL injections. An out-of-band SQL attack is considered to be the most dangerous because of its characteristics’ combination. Attention was also paid on the need of periodic testing and monitoring, which is an actual method of protection against SQL injections. It is emphasized, that the best testing method is undertaking code by the SQL injection. The protection methods, reviewed above, can increase the overall security of software products from attacks such as SQL injection, ensure the correct functionality of applications and the integrity of user data.
Paper version not known (
Free)
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have