SQL Injection Attack Vulnerability (Essay Sample)
INFA 610 WEEK 7 DISCUSSION
Most cyber-attacks happen because vulnerabilities in system or application software. Buffer Overflow, SQL Injection, Code/OS Command Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery and Race Conditions are very common vulnerabilities. (Refer to both NIST/DHS and MITRE databases of common vulnerabilities
http://nvd.nist.gov/cwe.cfm
http://cwe.mitre.org/top25/
For this conference, explain what a specific vulnerability is, describe a famous attack that leveraged it (For example, the Morris worm leveraged the buffer overflow vulnerability), and how it can be prevented/minimized.
Technology
Student Name
Institution’s Affiliation
Course
Date
SQL Injection Attack
SQL Injection Attack vulnerability refers to a situation where a person can access the database and change its queries. The attacker can also access sensitive information like passwords and other private credentials in the system. The accessibility also leaves the system exposed to any modification, deletion, or addition as per the person's wishes conducting the attack. Some attackers can go unnoticed for a long period as they slowly continue compromising with the databases as per their wishes(Alenezi et al, 2021). Examples of common SQL attacks include examining the databases to get information about their version and structure, changing the logic of the application queries, and retrieving data from different databases.
Other Topics:
- A Comparison of Three Perspective on the Evolution of TechnologyDescription: Technological progress has been measured and understood in many different ways, by various anthropologists, sociologists, and other researchers. However, there are similarities and differences between three different individuals and their thoughts on technological progress. One of these individuals was...1 page/≈550 words| 2 Sources | APA | Technology | Essay |
- Global Positioning System (GPS) Mobile MarketingDescription: GPS mobile marketing is an innovation in business for solving a variety of tasks such as sales promotion, obtaining objective ratings of advertisements and information channels, analyzing the effectiveness of distribution networks and regional markets. Location-based services including mobile phones with GPS...3 pages/≈825 words| 3 Sources | APA | Technology | Essay |
- Data Analysis and DisseminationDescription: The areas which I feel confident about program evaluation includes the analysis of quantitative data such as tallying responses from various population, counting of the program activities carried pout during evaluations, and the interpretations of data. Qualitative analysis involves looking at the shared stories...1 page/≈275 words| 2 Sources | APA | Technology | Essay |