5.3 Database Security Countermeasures P2 Flashcards
What is SQL injection?
Lethal code can be directly placed into the user input field
How is SQL injection done?
- Types in URL to company’s website
- Prompted to provide a username & password
- 1 Syntax in username field (‘or’1’=’1-)
- 2 Returns 1st entry in given table (username & then password table)
How to avoid SQL injection as a threat?
Ensure application validates data being received before sending to database
What does SET stand for?
Secure Electronic Transactions
What does SET mean (definition)?
Protocol designed to handle secure bank payments over the internet
What is SET used for?
DES encryption
RSA encryption
Why is the SET transaction split
So the merchant has access to information about:
What is being purchased
How much it costs
Whether payment is approved
What information does the merchant NOT have access to?
What payment method the customer is using
What is involved in non-computer controls?
Policies agreements, and administrative controls: Security policy & contingency plan Personnel controls Secure positioning of equipment Maintenance agreements Physical access controls
Why is it important to test security?
To ensure security measures are adequate
Testing is an ongoing process and carried out regularly (threats don’t disappear - may evolve again at anytime)
Database security is a huge area requiring knowledge - not just of databases but also of the environment within which they operate