Database Security Flashcards

1
Q

What kind of attack is the following, and what is the attack attempting to do: SELECT * FROM users WHERE username = ‘admin’ AND password = ‘password’ OR 1=1 AND age > 25;

A

In this example, the attacker is attempting to log in to the website as the administrator by injecting malicious SQL code into the username and password fields. The “OR 1=1” statement is a common SQL injection technique that always returns true, allowing the attacker to bypass the website’s authentication mechanism. The “AND age > 25” statement is an example of statistical inference, where the attacker is trying to extract sensitive information about the users, in this case, those who are older than 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Indicate signs or symptoms that there might be an injection attack on a website or web application.

A

Unusual web traffic: If you notice a sudden increase in web traffic, especially to pages that are not usually popular, it could be a sign of an injection attack.

Strange URLs: If you see URLs that contain unusual characters, such as quotes, semicolons, or other special characters, it could be an attempt to inject code into your web system.

Error messages: If you see error messages on your website that contain injection code, it could be a sign that someone is trying to exploit vulnerabilities in your website’s database or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Evaluate the effectiveness of accidental DBMS security threats.

A

Accidental DBMS security threats can occur when an authorized user of a database management system (DBMS) accidentally causes a security breach. These types of threats can include actions such as mistakenly deleting important data, exposing sensitive information, or unintentionally allowing unauthorized access to the system.

The effectiveness of accidental DBMS security threats can vary depending on the severity of the breach and the security measures in place to prevent and mitigate such incidents. In some cases, accidental threats can result in significant damage to a company’s reputation and financial losses due to data breaches or other security incidents. However, accidental threats are typically less severe than intentional threats, such as those caused by malicious insiders or external attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Appraise the mitigation strategies for accidental DBMS security threats.

A

To mitigate the risk of accidental DBMS security threats, companies should implement robust security measures, such as access controls, encryption, and data backups. Regular employee training and awareness programs can also help to prevent accidental threats by educating employees on best practices for data handling and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Apart from SQL injection attacks, identify other types of database security threats.

A

Malware: Malware is software that is designed to damage or exploit computer systems. Malware can infect databases and steal or corrupt data, or even provide remote access to attackers.

Insider threats: Insider threats are risks posed by individuals within an organization who have access to the database. These individuals may intentionally or accidentally misuse data or provide unauthorized access to outsiders.

Password attacks: Password attacks are attempts to guess or crack user passwords in order to gain unauthorized access to a database. Common methods include brute force attacks, dictionary attacks, and social engineering.

Denial of service (DoS) attacks: DoS attacks are designed to overwhelm a database with traffic or requests, making it unavailable to legitimate users. DoS attacks can be launched from a single machine or from a botnet, and can cause significant disruption and damage.

Data breaches: Data breaches occur when sensitive or confidential data is accessed or stolen by unauthorized parties. Breaches can be caused by external attackers, insiders, or by accidental data exposure.

Eavesdropping: Eavesdropping is the interception and monitoring of data transmissions between a client and server. Attackers can use eavesdropping to steal sensitive information such as usernames, passwords, or financial data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly