Wednesday, January 1, 2020

Annotated Bibliography On Sql Injection - 3742 Words

SQL Injection 11/17/2014 name: Seth Clemens pseudonym: Tazmania deterlab: ru245ag Department of Computer Science, ITEC 345 Radford University Radford, United States of America sclemens@radford.edu Abstract – With data, now more than ever, being stored on databases instead of in filing cabinets, the awareness of SQL Injection attacks need to be raised. The goal of this document is to provide a basic understanding of SQL attacks, how they are executed, and what preventative measures can be taken to prevent such a dangerous attack from happening. I. INTRODUCTION Before computers were invented, humans would store data in filing cabinets, safes, libraries, and other such places. However, the method of storing data changed when computerized databases were invented in the 1960’s [4]. Storing data in a digital database became more of a time and cost efficient method over storing data in filing cabinets or other like places. Computerized databases provide the user, or users, the ability to access, add, or remove data in a matter of seconds rather than the possible hours it could take, going through hundreds of physical folders. Databases are normally used by businesses and schools to store their data. These databases are kept secure, and users can only access the information stored on the database they have been granted access to. Now data is added to, accessed, or remove from a database using languages such as SQL (Structured Query Language), MYSQL (My Sequel), etc.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.