SlideShare a Scribd company logo
Database security
injection and other attacks
Ahmed shamel
supervised by:
Dr. shimaa hameed
Introduction
What Is Database Security?
 Database
It is a collection of information stored in a computer.
 Security
It is being free from danger.
 Database Security
It is the mechanisms that protect the database
against intentional or accidental threats.
Three Main Aspects
What data base
need?
Secrecy Integrity Availability
Secrecy
It is protecting the database from unauthorized users.
Ensures that users are allowed to do the things they are
trying to do.
For examples,
The employees should not
see the salaries of their managers.
Only authorized users should be allowed to modify
data.
Ensures that what users are trying to do is correct.
For examples,
An employee should be able to modify his or her
own information.
Integrity
Authorized users should be able to access data at any
time they need for Legal purposes as necessary
For examples,
Payment orders regarding taxes should be made on
time by the tax law.
Availability
Threat
Threat is any intentional or accidental event that may adversely
affect the system.
 Examples of threats:
- Using another person’s log-in name to access data.
- Unauthorized copying data.
- Program/Data alteration.
- Illegal entry by hacker
- Viruses
Kinds of Threat
1. Non-fraudulent Threat
 Natural or accidental disasters.
 Errors or bugs in hardware or software.
 Human errors.
2. fraudulent Threat
Exploitation of Vulnerable .
Input Injection (Formerly SQL Injection) .
Input Injection (Formerly SQL Injection)
 SQL injection is a technique where malicious users can inject SQL commands into
an SQL statement, via web page input.
 Injected SQL commands can alter SQL statement and compromise the security of a
web application.
 There are two major types of database injection attacks :
1) SQL Injection that targets traditional database systems .
2) NoSQL (stands for not only SQL( Injection that targets Big Data platforms.
SQL Injection attacks usually involve inserting (or “injecting”) unauthorized or
malicious statements into the input fields of web applications. On the other hand,
NoSQL injection attacks involve inserting malicious statements into Big Data
components .
In both types, a successful Input Injection attack can give an attacker unrestricted
access to an entire database.
Legal
access by
user name
password
Big websites usually use a variety of databases,
because different databases serve different purposes.
How the Injection (Statements ) work?
 the web application is literally asking the database server:
((do we have a user with the username 'Ahmed' and the password
'AAAA' registered in the system? ))
 the Sql Syntax is broken and an error occurs.
 This plays a key role in Sql injection
if an attacker is able to "smuggle " special character (which is
not filtered by web application)
It is possible to modify the Sql queries, their logic and hence
the application's behavior.
checking the web design if it pass special character to
database queries
What happen if we pass this command throw
the web application
What in fact happen inside the Database
The statement which always true 1=1
The attacker is successfully authenticated as the first
user from the top of the list (the first row) for ex:
Threat Countermeasures
Computer-Based Controls:
- Authorization
- Authenticating
- Backup and Recovery
- view
- Encryption
- RAID Technology
 Authorization
The granting of a privilege that enable a user to have legitimate access
to a system.
 Authenticating
A system administrator is responsible for allowing users to have access
to the system by creating individual user accounts.
 Backup & Recovery
Is the process of periodically taking a copy of the database and log file
onto offline storage media.
 View
hiding parts of the database from certain users that provides a
powerful and flexible security mechanism.
 Redundant Array of Independent Disks (RAID)
The hardware that the DBMS is running on must be fault-tolerant,
meaning that the DBMS should continue to operate even if one of the
hardware components fails.
Data base security and injection

More Related Content

What's hot

Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Database security
Database securityDatabase security
Database security
MaryamAsghar9
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
Raj vardhan
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
bdemchak
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
Raj vardhan
 
Security testing
Security testingSecurity testing
Security testing
baskar p
 
Database Security
Database SecurityDatabase Security
Database Security
RabiaIftikhar10
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6
AfiqEfendy Zaen
 
System security
System securitySystem security
System security
sommerville-videos
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
Zara Nawaz
 
Unit4 next
Unit4 nextUnit4 next
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
Kabul Education University
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
David Zaizar
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
TechWell
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
Kal BO
 

What's hot (20)

Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Database security
Database securityDatabase security
Database security
 
Data security
Data securityData security
Data security
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Database Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database SecurityDatabase Security Concepts | Introduction to Database Security
Database Security Concepts | Introduction to Database Security
 
Security testing
Security testingSecurity testing
Security testing
 
Database Security
Database SecurityDatabase Security
Database Security
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6
 
System security
System securitySystem security
System security
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
1 security goals
1   security goals1   security goals
1 security goals
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
System Security
System SecuritySystem Security
System Security
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 

Viewers also liked

Arithmatic pipline
Arithmatic piplineArithmatic pipline
Arithmatic pipline
A. Shamel
 
Malicion software
Malicion softwareMalicion software
Malicion software
A. Shamel
 
Data base security
Data base securityData base security
Data base security
Sara Nazir
 
2010 db security
2010 db security2010 db security
2010 db security
Wayne Evans
 
GSM & CDMA & OFDM
GSM & CDMA & OFDMGSM & CDMA & OFDM
GSM & CDMA & OFDM
A. Shamel
 
Analog communication
Analog communicationAnalog communication
Analog communication
A. Shamel
 
Adaptive filter
Adaptive filterAdaptive filter
Adaptive filter
A. Shamel
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
A. Shamel
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 
Microcontroller 8051
Microcontroller 8051Microcontroller 8051
Microcontroller 8051
Patruni Chidananda Sastry
 
8051 ram org
8051 ram org8051 ram org
8051 ram org
sindhu sindhu
 
Oracle Key Vault Overview
Oracle Key Vault OverviewOracle Key Vault Overview
Oracle Key Vault Overview
Troy Kitch
 
Architecture of tms320 f2812
Architecture of tms320 f2812Architecture of tms320 f2812
Architecture of tms320 f2812
Pantech ProLabs India Pvt Ltd
 
Dsp lab seminar
Dsp lab seminarDsp lab seminar
Dsp lab seminar
P V Krishna Mohan Gupta
 
8051 presentation
8051 presentation8051 presentation
8051 presentation
Shivashankar Sawalgi
 
8051 timer counter
8051 timer counter8051 timer counter
8051 timer counter
vishalgohel12195
 
Introduction to tms320c6745 dsp
Introduction to tms320c6745 dspIntroduction to tms320c6745 dsp
Introduction to tms320c6745 dsp
Pantech ProLabs India Pvt Ltd
 
Floating point units
Floating point unitsFloating point units
Floating point units
dipugovind
 
Registration System for Training Program in STC
Registration System for Training Program in STCRegistration System for Training Program in STC
Registration System for Training Program in STC
alraee
 
8051 serial communication
8051 serial communication8051 serial communication
8051 serial communication
asteriskbimal
 

Viewers also liked (20)

Arithmatic pipline
Arithmatic piplineArithmatic pipline
Arithmatic pipline
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Data base security
Data base securityData base security
Data base security
 
2010 db security
2010 db security2010 db security
2010 db security
 
GSM & CDMA & OFDM
GSM & CDMA & OFDMGSM & CDMA & OFDM
GSM & CDMA & OFDM
 
Analog communication
Analog communicationAnalog communication
Analog communication
 
Adaptive filter
Adaptive filterAdaptive filter
Adaptive filter
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Microcontroller 8051
Microcontroller 8051Microcontroller 8051
Microcontroller 8051
 
8051 ram org
8051 ram org8051 ram org
8051 ram org
 
Oracle Key Vault Overview
Oracle Key Vault OverviewOracle Key Vault Overview
Oracle Key Vault Overview
 
Architecture of tms320 f2812
Architecture of tms320 f2812Architecture of tms320 f2812
Architecture of tms320 f2812
 
Dsp lab seminar
Dsp lab seminarDsp lab seminar
Dsp lab seminar
 
8051 presentation
8051 presentation8051 presentation
8051 presentation
 
8051 timer counter
8051 timer counter8051 timer counter
8051 timer counter
 
Introduction to tms320c6745 dsp
Introduction to tms320c6745 dspIntroduction to tms320c6745 dsp
Introduction to tms320c6745 dsp
 
Floating point units
Floating point unitsFloating point units
Floating point units
 
Registration System for Training Program in STC
Registration System for Training Program in STCRegistration System for Training Program in STC
Registration System for Training Program in STC
 
8051 serial communication
8051 serial communication8051 serial communication
8051 serial communication
 

Similar to Data base security and injection

How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
AlienVault
 
1738 1742
1738 17421738 1742
1738 1742
Editor IJARCET
 
1738 1742
1738 17421738 1742
1738 1742
Editor IJARCET
 
A Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseA Review Report on Security Threats on Database
A Review Report on Security Threats on Database
Shivnandan Singh
 
E017131924
E017131924E017131924
E017131924
IOSR Journals
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
IOSR Journals
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
IJCI JOURNAL
 
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
Rana sing
 
Final review ppt
Final review pptFinal review ppt
Final review ppt
Rana sing
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
idescitation
 
Database security
Database securityDatabase security
Database security
Mehrdad Jingoism
 
Sql injection bypassing hand book blackrose
Sql injection bypassing hand book blackroseSql injection bypassing hand book blackrose
Sql injection bypassing hand book blackrose
Noaman Aziz
 
Network security
Network securityNetwork security
Network security
Ashish Gaurkhede
 
IRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & MitigationIRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & Mitigation
IRJET Journal
 
Ijcatr04041018
Ijcatr04041018Ijcatr04041018
Ijcatr04041018
Editor IJCATR
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
Alwin Thayyil
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
journal ijrtem
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
IJRTEMJOURNAL
 
SQL injection
SQL injectionSQL injection
SQL injection
Raj Parmar
 
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
Suzanne Simmons
 

Similar to Data base security and injection (20)

How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
1738 1742
1738 17421738 1742
1738 1742
 
1738 1742
1738 17421738 1742
1738 1742
 
A Review Report on Security Threats on Database
A Review Report on Security Threats on DatabaseA Review Report on Security Threats on Database
A Review Report on Security Threats on Database
 
E017131924
E017131924E017131924
E017131924
 
SQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive AlgorithmSQL Injection Prevention by Adaptive Algorithm
SQL Injection Prevention by Adaptive Algorithm
 
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARDINTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
 
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
 
Final review ppt
Final review pptFinal review ppt
Final review ppt
 
Study of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their CountermeasuresStudy of Web Application Attacks & Their Countermeasures
Study of Web Application Attacks & Their Countermeasures
 
Database security
Database securityDatabase security
Database security
 
Sql injection bypassing hand book blackrose
Sql injection bypassing hand book blackroseSql injection bypassing hand book blackrose
Sql injection bypassing hand book blackrose
 
Network security
Network securityNetwork security
Network security
 
IRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & MitigationIRJET - SQL Injection: Attack & Mitigation
IRJET - SQL Injection: Attack & Mitigation
 
Ijcatr04041018
Ijcatr04041018Ijcatr04041018
Ijcatr04041018
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
 
SQL injection
SQL injectionSQL injection
SQL injection
 
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
 

More from A. Shamel

Vmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenterVmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenter
A. Shamel
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
A. Shamel
 
Buses and protocol
Buses and protocolBuses and protocol
Buses and protocol
A. Shamel
 
Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)
A. Shamel
 
Omnet sem
Omnet semOmnet sem
Omnet sem
A. Shamel
 
Foc ch4
Foc ch4Foc ch4
Foc ch4
A. Shamel
 

More from A. Shamel (7)

Vmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenterVmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenter
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
 
Buses and protocol
Buses and protocolBuses and protocol
Buses and protocol
 
Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)
 
Omnet sem
Omnet semOmnet sem
Omnet sem
 
Foc ch4
Foc ch4Foc ch4
Foc ch4
 

Recently uploaded

Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 

Recently uploaded (20)

Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 

Data base security and injection

  • 1. Database security injection and other attacks Ahmed shamel supervised by: Dr. shimaa hameed
  • 3. What Is Database Security?  Database It is a collection of information stored in a computer.  Security It is being free from danger.  Database Security It is the mechanisms that protect the database against intentional or accidental threats.
  • 4. Three Main Aspects What data base need? Secrecy Integrity Availability
  • 5. Secrecy It is protecting the database from unauthorized users. Ensures that users are allowed to do the things they are trying to do. For examples, The employees should not see the salaries of their managers.
  • 6. Only authorized users should be allowed to modify data. Ensures that what users are trying to do is correct. For examples, An employee should be able to modify his or her own information. Integrity
  • 7. Authorized users should be able to access data at any time they need for Legal purposes as necessary For examples, Payment orders regarding taxes should be made on time by the tax law. Availability
  • 8. Threat Threat is any intentional or accidental event that may adversely affect the system.  Examples of threats: - Using another person’s log-in name to access data. - Unauthorized copying data. - Program/Data alteration. - Illegal entry by hacker - Viruses
  • 9. Kinds of Threat 1. Non-fraudulent Threat  Natural or accidental disasters.  Errors or bugs in hardware or software.  Human errors. 2. fraudulent Threat Exploitation of Vulnerable . Input Injection (Formerly SQL Injection) .
  • 10. Input Injection (Formerly SQL Injection)  SQL injection is a technique where malicious users can inject SQL commands into an SQL statement, via web page input.  Injected SQL commands can alter SQL statement and compromise the security of a web application.
  • 11.  There are two major types of database injection attacks : 1) SQL Injection that targets traditional database systems . 2) NoSQL (stands for not only SQL( Injection that targets Big Data platforms. SQL Injection attacks usually involve inserting (or “injecting”) unauthorized or malicious statements into the input fields of web applications. On the other hand, NoSQL injection attacks involve inserting malicious statements into Big Data components . In both types, a successful Input Injection attack can give an attacker unrestricted access to an entire database.
  • 12. Legal access by user name password Big websites usually use a variety of databases, because different databases serve different purposes.
  • 13. How the Injection (Statements ) work?  the web application is literally asking the database server: ((do we have a user with the username 'Ahmed' and the password 'AAAA' registered in the system? ))
  • 14.  the Sql Syntax is broken and an error occurs.  This plays a key role in Sql injection
  • 15. if an attacker is able to "smuggle " special character (which is not filtered by web application) It is possible to modify the Sql queries, their logic and hence the application's behavior.
  • 16. checking the web design if it pass special character to database queries
  • 17. What happen if we pass this command throw the web application
  • 18. What in fact happen inside the Database The statement which always true 1=1
  • 19. The attacker is successfully authenticated as the first user from the top of the list (the first row) for ex:
  • 20. Threat Countermeasures Computer-Based Controls: - Authorization - Authenticating - Backup and Recovery - view - Encryption - RAID Technology
  • 21.  Authorization The granting of a privilege that enable a user to have legitimate access to a system.  Authenticating A system administrator is responsible for allowing users to have access to the system by creating individual user accounts.  Backup & Recovery Is the process of periodically taking a copy of the database and log file onto offline storage media.
  • 22.  View hiding parts of the database from certain users that provides a powerful and flexible security mechanism.  Redundant Array of Independent Disks (RAID) The hardware that the DBMS is running on must be fault-tolerant, meaning that the DBMS should continue to operate even if one of the hardware components fails.

Editor's Notes

  1. التهديد هو اي حدث حصل متعمداً أو عرضا التي قد تؤثر سلبا على النظام. - استبدال برنامج / البيانات - الدخول غير المشروع من قبل القراصنة - الفيروسات
  2. نوعين من التهديدات الغير مقصوده او غير المزوره((بصوره طبيعية او عن طريق حادث ,الفشل في هاردوير او سوفت وير , واخطاء بشريه)) والتهديدات المقصوده المزوره ((استغلال الثغرات ونقاط الضعف , او بواسطة الحقن )
  3. الاول يستهدف الداتتا بيس نفسها الثاني يستهدف البيانات التي ع الداتا بيس
  4. اذا كان المخترق قادر ان يهرب بعض الرموز الخاصة التي لم تحجب من تصميم الصفه اي ان تعبر خلال الويب دزاين ال sql quires
  5. Compiler of Sql appear in the attacker web browser
  6. منح امتياز التي تمكن المستخدم من الوصول الشرعي للنظام.
  7. إخفاء أجزاء من قاعدة البيانات من بعض المستخدمين أن يوفر آلية أمنية قوية ومرنة. يجب أن يكون الجهاز الذي نظم إدارة قواعد البيانات يعمل على قبول نسبة الخطىء ، وهذا يعني أن نظم إدارة قواعد البيانات ينبغي أن تستمر في العمل حتى لو فشل أحد مكونات الأجهزة.