SlideShare uma empresa Scribd logo
1 de 19
DBMS Vulnerabilities And
Threats
(Broken Authentication)
https://www.zdnet.com/article/the-top-ten-most-common-database-security-
vulnerabilities/
DATABASES
• Enterprise database and information storage infrastructures, holding the crown
jewels of an organisation, are subject to a wide range of abuses and attacks,
particularly when left vulnerable by poor system design or configuration.
• Databases are a key target for cybercriminals due to the often valuable nature of
sensitive information locked away inside.
• Whether the data is financial or holds intellectual property and corporate secrets,
hackers worldwide can profit from breaching a businesses' servers and
plundering databases.
TOP 10 VULNERABILITIES – 1)DEPLOYMENT FAILURES
• The most common cause of database vulnerabilities is a lack of due care at the
moment they are deployed.
• Although any given database is tested for functionality and to make sure it is
doing what the databases is designed to do, very few checks are made to check
the database is not doing things it should not be doing.
TOP 10 VULNERABILITIES – 2) BROKEN DATABASES
• The SQL Slammer worm of 2003 was able to infect more than 90 percent of vulnerable
computers within 10 minutes of deployment, taking down thousands of databases in
minutes. This worm took advantage of a bug that was discovered in Microsoft's SQL
Server database software the previous year, but few system administrators installed a fix,
leaving computers vulnerable.
• By exploiting a buffer-overflow vulnerability, the worm's success demonstrates how
critical installing security patches and fixes are.
• However, whether lacking time or resources, not enough businesses keep their systems
regularly patched, leaving databases vulnerable.
QL Slammer is a worm that targets unpatched Microsoft SQL 2000 servers. The worm spreads
between servers, increasing traffic on UDP port 1434 and causing heavy network traffic that can
slow down network performance and lead to denial of service. SQL slammer does not carry a
destructive payload.
TOP 10 VULNERABILITIES -3)DATA LEAKS
• Databases may be considered a "back end" part of the office and secure from Internet-
based threats (and so data doesn't have to be encrypted), but this is not the case.
• Databases also contain a networking interface, and so hackers are able to capture this type
of traffic to exploit it.
• To avoid such a pitfall, administrators should use SSL- or TLS-encrypted communication
platforms.
TOP 10 VULNERABILITIES – 4) STOLEN DATABASE
BACKUPS
• External attackers who infiltrate systems to steal data are one threat, but what
about those inside the corporation?
• The report suggests that insiders are also likely to steal archives — including
database backups — whether for money, profit or revenge.
• This is a common problem for the modern enterprise, and businesses should
consider encrypting archives to mitigate the insider-risk.
TOP 10 VULNERABILITIES – 5) THE ABUSE OF
DATABASE FEATURES
• The research team says that over the past three years, every database exploit
they've seen has been based on the misuse of a standard database feature. For
example, a hacker can gain access through legitimate credentials before forcing
the service to run arbitrary code.
• Although complex, in many cases, this access was gained through simple flaws
that allow such systems to be taken advantage of or bypassed completely.
• Future abuse can be limited by removing unnecessary tools — not by destroying
the possibility of zero-day exploits, but by at least shrinking the surface area
hackers can study to launch an attack.
TOP 10 VULNERABILITIES – 6) A LACK OF
SEGREGATION
• The separation of administrator and user powers, as well as the segregation of
duties, can make it more difficult for fraud or theft undertaken by internal staff.
• In addition, limiting the power of user accounts may give a hacker a harder time
in taking complete control of a database.
TOP 10 VULNERABILITIES – 7) HOPSCOTCH
• Rather than taking advantage of buffer overflow and gaining complete access to
a database in the first stage, cybercriminals often play a game of Hopscotch:
finding a weakness within the infrastructure that can be used as leverage for
more serious attacks until they reach the back-end database system. For example,
a hacker may worm their way through your accounts department before hitting
the credit card processing area.
• Unless every department has the same standard of control, creating separate
administrator accounts and segregating systems can help mitigate the risk
TOP 10 VULNERABILITIES – 8) SQL INJECTIONS
• A popular method for hackers to take, SQL injections remain a critical problem in the
protection of enterprise databases.
• In a SQL injection attack, an attacker typically inserts (or “injects”) unauthorized SQL
statements into a vulnerable SQL data channel.
• Targeted data channels include stored procedures and Web application input
parameters.
• These injected statements are then passed to the database where they are executed.
For example in a web application the user inserts a query instead of his name. Using
SQL injection, attackers may gain unrestricted access to an entire database .
• Applications are attacked by injections by unclean variables and malicious code which
is inserted into strings, later passed to an instance of SQL server for parsing and
execution.
TOP 10 VULNERABILITIES – 8) SQL INJECTIONS
(CONTINUE)
1. Avoid the use of dynamic queries within applications. Use of prepared
statements with parametrized queries will stop SQL injection.
2. Implement user input validation before that input is passed to the application.
This is a very worthwhile additional defence which also helps towards many
other attacks.
3. The best ways to protect against these threats are to protect web-facing
databases with firewalls and to test input variables for SQL injection during
development.
MYSQL PHP API-PREPARED STATEMENT
• The MySQL database supports prepared statements.
• A prepared statement or a parameterized statement is used to execute the same statement
repeatedly with high efficiency. The database parses, compiles, and performs query
optimization on the SQL statement template, and stores the result without executing it.
• The prepared statement execution consists of two stages: prepare and execute.
• At the prepare stage a statement template is sent to the database server.
• The server performs a syntax check and initializes server internal resources for later use.
• The MySQL server supports using anonymous, positional placeholder with ?.
• Prepare is followed by execute. During execute the client binds parameter values and sends
them to the server. The server creates a statement from the statement template and the
bound values to execute it using the previously created internal resources.
Prepare
https://dev.mysql.com/doc/apis-php/en/apis-php-mysqli.quickstart.prepared-statements.html
Bind And Execute
https://dev.mysql.com/doc/apis-php/en/apis-php-mysqli.quickstart.prepared-statements.html
PREPARED STATEMENTS AND BOUND PARAMETERS
Prepared statements basically work like this:
• Prepare:
• An SQL statement template is created and sent to the database.
• Certain values are left unspecified, called parameters (labeled "?"). Example: INSERT INTO MyGuests
VALUES(?, ?, ?)
• The database parses, compiles, and performs query optimization on the SQL statement template,
and stores the result without executing it
• Execute:
• At a later time, the application binds the values to the parameters, and the database executes the
statement.
• The application may execute the statement as many times as it wants with different values
PREPARED STATEMENT VS SQL STATEMENT
Compared to executing SQL statements directly, prepared statements have three main advantages:
• Prepared statements reduce parsing time as the preparation on the query is done only once
(although the statement is executed multiple times)
• Bound parameters minimize bandwidth to the server as you need send only the parameters each
time, and not the whole query
• Prepared statements are very useful against SQL injections, because parameter values, which are
transmitted later using a different protocol, need not be correctly escaped. If the original
statement template is not derived from external input, SQL injection cannot occur.
TOP 10 VULNERABILITIES – 9) SUB-STANDARD KEY
MANAGEMENT
• Key management systems are meant to keep keys safe, but the research team
often found encryption keys stored on company disk drives.
• Database administrators sometimes falsely believe these keys have to be left on
the disk because of database failures, but this isn't true — and placing such keys
in an unprotected state can leave systems vulnerable to attack.
TOP 10 VULNERABILITIES – 10) DATABASE
INCONSISTENCIES
• The researchers found that the common threat which brings all of these
vulnerabilities together is a lack of consistency, which is an administrative rather
than database technology problem.
• System administrators and database developers need to develop a consistent
practice in looking after their databases, staying aware of threats and making sure
that vulnerabilities are taken care of.
• This isn't an easy task, but documentation and automation to track and make
changes can ensure that the information contained in enterprise networks is kept
secure.
AN ATTACKER CAN BE CATEGORIZED INTO THREE
CLASSES
An attacker can be categorized into three classes :
• Intruder
An intruder is a person who is an unauthorized user means illegally accessing a computer system and tries
to extract valuable information.
• Insider
An insider is a person who belongs to the group of trusted users and makes abuse of her privileges and
tries to get information beyond his own access rights.
• Administrator
An administrator is a person who has privileges to administer a computer system, but uses her
administration privileges illegally according to organization’s security policy to spy on DBMS behavior and
to get valuable information

Mais conteúdo relacionado

Semelhante a DBMS Vulnerabilities And Threats.pptx

owasp top 10 security risk categories and CWE
owasp top 10 security risk categories and CWEowasp top 10 security risk categories and CWE
owasp top 10 security risk categories and CWE
Arun Voleti
 
Application hardening
Application hardeningApplication hardening
Application hardening
Jayesh Naik
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
SakshiGawde6
 

Semelhante a DBMS Vulnerabilities And Threats.pptx (20)

Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
owasp top 10 security risk categories and CWE
owasp top 10 security risk categories and CWEowasp top 10 security risk categories and CWE
owasp top 10 security risk categories and CWE
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Webdays blida mobile top 10 risks
Webdays blida   mobile top 10 risksWebdays blida   mobile top 10 risks
Webdays blida mobile top 10 risks
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
The Top 10 Most Common Weaknesses in Serverless Applications 2018
The Top 10 Most Common Weaknesses in Serverless Applications 2018The Top 10 Most Common Weaknesses in Serverless Applications 2018
The Top 10 Most Common Weaknesses in Serverless Applications 2018
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a Database
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Oracle database threats - LAOUC Webinar
Oracle database threats - LAOUC WebinarOracle database threats - LAOUC Webinar
Oracle database threats - LAOUC Webinar
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
Drupal Security Basics for the DrupalJax January Meetup
Drupal Security Basics for the DrupalJax January MeetupDrupal Security Basics for the DrupalJax January Meetup
Drupal Security Basics for the DrupalJax January Meetup
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 
SQLi for Security Champions
SQLi for Security ChampionsSQLi for Security Champions
SQLi for Security Champions
 
Database security2 adebiaye
Database security2 adebiayeDatabase security2 adebiaye
Database security2 adebiaye
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Database security
Database securityDatabase security
Database security
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

DBMS Vulnerabilities And Threats.pptx

  • 1. DBMS Vulnerabilities And Threats (Broken Authentication) https://www.zdnet.com/article/the-top-ten-most-common-database-security- vulnerabilities/
  • 2. DATABASES • Enterprise database and information storage infrastructures, holding the crown jewels of an organisation, are subject to a wide range of abuses and attacks, particularly when left vulnerable by poor system design or configuration. • Databases are a key target for cybercriminals due to the often valuable nature of sensitive information locked away inside. • Whether the data is financial or holds intellectual property and corporate secrets, hackers worldwide can profit from breaching a businesses' servers and plundering databases.
  • 3. TOP 10 VULNERABILITIES – 1)DEPLOYMENT FAILURES • The most common cause of database vulnerabilities is a lack of due care at the moment they are deployed. • Although any given database is tested for functionality and to make sure it is doing what the databases is designed to do, very few checks are made to check the database is not doing things it should not be doing.
  • 4. TOP 10 VULNERABILITIES – 2) BROKEN DATABASES • The SQL Slammer worm of 2003 was able to infect more than 90 percent of vulnerable computers within 10 minutes of deployment, taking down thousands of databases in minutes. This worm took advantage of a bug that was discovered in Microsoft's SQL Server database software the previous year, but few system administrators installed a fix, leaving computers vulnerable. • By exploiting a buffer-overflow vulnerability, the worm's success demonstrates how critical installing security patches and fixes are. • However, whether lacking time or resources, not enough businesses keep their systems regularly patched, leaving databases vulnerable. QL Slammer is a worm that targets unpatched Microsoft SQL 2000 servers. The worm spreads between servers, increasing traffic on UDP port 1434 and causing heavy network traffic that can slow down network performance and lead to denial of service. SQL slammer does not carry a destructive payload.
  • 5. TOP 10 VULNERABILITIES -3)DATA LEAKS • Databases may be considered a "back end" part of the office and secure from Internet- based threats (and so data doesn't have to be encrypted), but this is not the case. • Databases also contain a networking interface, and so hackers are able to capture this type of traffic to exploit it. • To avoid such a pitfall, administrators should use SSL- or TLS-encrypted communication platforms.
  • 6. TOP 10 VULNERABILITIES – 4) STOLEN DATABASE BACKUPS • External attackers who infiltrate systems to steal data are one threat, but what about those inside the corporation? • The report suggests that insiders are also likely to steal archives — including database backups — whether for money, profit or revenge. • This is a common problem for the modern enterprise, and businesses should consider encrypting archives to mitigate the insider-risk.
  • 7. TOP 10 VULNERABILITIES – 5) THE ABUSE OF DATABASE FEATURES • The research team says that over the past three years, every database exploit they've seen has been based on the misuse of a standard database feature. For example, a hacker can gain access through legitimate credentials before forcing the service to run arbitrary code. • Although complex, in many cases, this access was gained through simple flaws that allow such systems to be taken advantage of or bypassed completely. • Future abuse can be limited by removing unnecessary tools — not by destroying the possibility of zero-day exploits, but by at least shrinking the surface area hackers can study to launch an attack.
  • 8. TOP 10 VULNERABILITIES – 6) A LACK OF SEGREGATION • The separation of administrator and user powers, as well as the segregation of duties, can make it more difficult for fraud or theft undertaken by internal staff. • In addition, limiting the power of user accounts may give a hacker a harder time in taking complete control of a database.
  • 9. TOP 10 VULNERABILITIES – 7) HOPSCOTCH • Rather than taking advantage of buffer overflow and gaining complete access to a database in the first stage, cybercriminals often play a game of Hopscotch: finding a weakness within the infrastructure that can be used as leverage for more serious attacks until they reach the back-end database system. For example, a hacker may worm their way through your accounts department before hitting the credit card processing area. • Unless every department has the same standard of control, creating separate administrator accounts and segregating systems can help mitigate the risk
  • 10. TOP 10 VULNERABILITIES – 8) SQL INJECTIONS • A popular method for hackers to take, SQL injections remain a critical problem in the protection of enterprise databases. • In a SQL injection attack, an attacker typically inserts (or “injects”) unauthorized SQL statements into a vulnerable SQL data channel. • Targeted data channels include stored procedures and Web application input parameters. • These injected statements are then passed to the database where they are executed. For example in a web application the user inserts a query instead of his name. Using SQL injection, attackers may gain unrestricted access to an entire database . • Applications are attacked by injections by unclean variables and malicious code which is inserted into strings, later passed to an instance of SQL server for parsing and execution.
  • 11. TOP 10 VULNERABILITIES – 8) SQL INJECTIONS (CONTINUE) 1. Avoid the use of dynamic queries within applications. Use of prepared statements with parametrized queries will stop SQL injection. 2. Implement user input validation before that input is passed to the application. This is a very worthwhile additional defence which also helps towards many other attacks. 3. The best ways to protect against these threats are to protect web-facing databases with firewalls and to test input variables for SQL injection during development.
  • 12. MYSQL PHP API-PREPARED STATEMENT • The MySQL database supports prepared statements. • A prepared statement or a parameterized statement is used to execute the same statement repeatedly with high efficiency. The database parses, compiles, and performs query optimization on the SQL statement template, and stores the result without executing it. • The prepared statement execution consists of two stages: prepare and execute. • At the prepare stage a statement template is sent to the database server. • The server performs a syntax check and initializes server internal resources for later use. • The MySQL server supports using anonymous, positional placeholder with ?. • Prepare is followed by execute. During execute the client binds parameter values and sends them to the server. The server creates a statement from the statement template and the bound values to execute it using the previously created internal resources.
  • 15. PREPARED STATEMENTS AND BOUND PARAMETERS Prepared statements basically work like this: • Prepare: • An SQL statement template is created and sent to the database. • Certain values are left unspecified, called parameters (labeled "?"). Example: INSERT INTO MyGuests VALUES(?, ?, ?) • The database parses, compiles, and performs query optimization on the SQL statement template, and stores the result without executing it • Execute: • At a later time, the application binds the values to the parameters, and the database executes the statement. • The application may execute the statement as many times as it wants with different values
  • 16. PREPARED STATEMENT VS SQL STATEMENT Compared to executing SQL statements directly, prepared statements have three main advantages: • Prepared statements reduce parsing time as the preparation on the query is done only once (although the statement is executed multiple times) • Bound parameters minimize bandwidth to the server as you need send only the parameters each time, and not the whole query • Prepared statements are very useful against SQL injections, because parameter values, which are transmitted later using a different protocol, need not be correctly escaped. If the original statement template is not derived from external input, SQL injection cannot occur.
  • 17. TOP 10 VULNERABILITIES – 9) SUB-STANDARD KEY MANAGEMENT • Key management systems are meant to keep keys safe, but the research team often found encryption keys stored on company disk drives. • Database administrators sometimes falsely believe these keys have to be left on the disk because of database failures, but this isn't true — and placing such keys in an unprotected state can leave systems vulnerable to attack.
  • 18. TOP 10 VULNERABILITIES – 10) DATABASE INCONSISTENCIES • The researchers found that the common threat which brings all of these vulnerabilities together is a lack of consistency, which is an administrative rather than database technology problem. • System administrators and database developers need to develop a consistent practice in looking after their databases, staying aware of threats and making sure that vulnerabilities are taken care of. • This isn't an easy task, but documentation and automation to track and make changes can ensure that the information contained in enterprise networks is kept secure.
  • 19. AN ATTACKER CAN BE CATEGORIZED INTO THREE CLASSES An attacker can be categorized into three classes : • Intruder An intruder is a person who is an unauthorized user means illegally accessing a computer system and tries to extract valuable information. • Insider An insider is a person who belongs to the group of trusted users and makes abuse of her privileges and tries to get information beyond his own access rights. • Administrator An administrator is a person who has privileges to administer a computer system, but uses her administration privileges illegally according to organization’s security policy to spy on DBMS behavior and to get valuable information