SlideShare a Scribd company logo
1 of 2
Download to read offline
Database security is critical but often developers are not prepared for potential attacks find an
article on a web based database that has been attacked or exploited summarize what happened
and include URL.
Database security is critical but often developers are not prepared for potential attacks find an
article on a web based database that has been attacked or exploited summarize what happened
and include URL.
Solution
Guardian jobs database attack demonstrates difficulties of database security
One of the most popular job sites in Britain with more than ten million unique users. Managed by
third-party job board software supplier Madgex, the cracked database contained names, e-mail
addresses, covering letters and CVs.
Widespread exposure
Every year we share more of ourselves online- Each time we do any of these things, we place our
data and our faith in commercial databases - Oracle, Microsoft SQL Server, IBM DB2, Sybase,
MySQL - and the overarching security measures taken by the businesses that own these
databases.
the Guardian breach has alerted IT and security managers of the need to protect their user data
and to consider data security from every angle. Most have already spent time, money and
valuable resources securing their network perimeters with firewalls and anti-virus software, and
even protecting their laptops with hard disc encryption and DLP solutions. It is a necessary step,
but one which can also be guilty of generating a false sense of security.
SQL vulnerability
So how was The Guardian's data accessed? Well, all fingers point to an SQL injection
vulnerability, a method currently in favour with hackers and data thieves. SQL injection attacks
exploit vulnerabilities at the web application layer to access sensitive data in back-end databases.
These web-based attacks pass undetected through firewalls and other perimeter defences,
including intrusion detection and intrusion prevention systems, then hijack the application server
to gain access to underlying database records.
Yet databases remain vulnerable. Which prompts the question, just how many organisations are
still open to this type of attack? And how many organisations do not understand that they are at
risk.
Continuous monitoring
Until recently, identifying unauthorised or suspicious access to databases was impractical and
complex. Logging all activity in the database itself significantly degrades system performance,
while at the same time generating massive amounts of transaction records, which creates a
"needle in the haystack" problem since all of the monitoring data must then be analysed and
filtered to identify anomalous activity, typically using home-grown scripts.
Big responsibility
But why access The Guardian's job site at all? The answer is the first rule of hacking: because
somebody discovered that they could. It may be argued that the theft of names, e-mail addresses,
CVs and cover letters is relatively unimportant, almost unthreatening.The definition of sensitive
data has broadened. Dates of birth, addresses, personal histories, details of daily lives - all this
data is useful to a fraudster, and may be the first steps towards more complete identity theft.
A deliberate attack that resulted in the theft of half a million personal records from a very high-
profile organisation is not to be sniffed at. Any enterprise that holds any personal data needs to
take every step to safeguard it. But it is not an easy job - just ask The Guardian.
URL:http://www.computerweekly.com/opinion/Guardian-jobs-database-attack-demonstrates-
difficulties-of-database-security

More Related Content

Similar to Database security is critical but often developers are not prepar.pdf

Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
malbert5
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
lmelaine
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
Sanyog Chandra
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
Yaakub Idris
 

Similar to Database security is critical but often developers are not prepar.pdf (20)

Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Dstca
DstcaDstca
Dstca
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Security threat in cloud computing
Security threat in cloud computingSecurity threat in cloud computing
Security threat in cloud computing
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 

More from pallavi953613

This graph is data collected from a species of water snake. Because .pdf
This graph is data collected from a species of water snake. Because .pdfThis graph is data collected from a species of water snake. Because .pdf
This graph is data collected from a species of water snake. Because .pdf
pallavi953613
 
Project Management GB544What are some of the challenges in requi.pdf
Project Management GB544What are some of the challenges in requi.pdfProject Management GB544What are some of the challenges in requi.pdf
Project Management GB544What are some of the challenges in requi.pdf
pallavi953613
 
Please read below case and individually take the role of “NGOsAdvoc.pdf
Please read below case and individually take the role of “NGOsAdvoc.pdfPlease read below case and individually take the role of “NGOsAdvoc.pdf
Please read below case and individually take the role of “NGOsAdvoc.pdf
pallavi953613
 

More from pallavi953613 (20)

You dilute a stock solution containing 2.5 x 107 cells ml by a fact.pdf
You dilute a stock solution containing 2.5 x 107 cells ml by a fact.pdfYou dilute a stock solution containing 2.5 x 107 cells ml by a fact.pdf
You dilute a stock solution containing 2.5 x 107 cells ml by a fact.pdf
 
Which of the following are fuzzy sets Highly creative people F(x) .pdf
Which of the following are fuzzy sets  Highly creative people  F(x) .pdfWhich of the following are fuzzy sets  Highly creative people  F(x) .pdf
Which of the following are fuzzy sets Highly creative people F(x) .pdf
 
When, if ever, is it legitimate to rebel against government authorit.pdf
When, if ever, is it legitimate to rebel against government authorit.pdfWhen, if ever, is it legitimate to rebel against government authorit.pdf
When, if ever, is it legitimate to rebel against government authorit.pdf
 
When can we use the paired t-testA. When we want the most powerfu.pdf
When can we use the paired t-testA. When we want the most powerfu.pdfWhen can we use the paired t-testA. When we want the most powerfu.pdf
When can we use the paired t-testA. When we want the most powerfu.pdf
 
what is the purpose of the 4 quadrant streak plateSolutionAnsw.pdf
what is the purpose of the 4 quadrant streak plateSolutionAnsw.pdfwhat is the purpose of the 4 quadrant streak plateSolutionAnsw.pdf
what is the purpose of the 4 quadrant streak plateSolutionAnsw.pdf
 
what is the co factor of restriction endonulease EcoRV that activiat.pdf
what is the co factor of restriction endonulease EcoRV that activiat.pdfwhat is the co factor of restriction endonulease EcoRV that activiat.pdf
what is the co factor of restriction endonulease EcoRV that activiat.pdf
 
This graph is data collected from a species of water snake. Because .pdf
This graph is data collected from a species of water snake. Because .pdfThis graph is data collected from a species of water snake. Because .pdf
This graph is data collected from a species of water snake. Because .pdf
 
The voltage applied to our salinity sensor probes from Week 11 cause.pdf
The voltage applied to our salinity sensor probes from Week 11 cause.pdfThe voltage applied to our salinity sensor probes from Week 11 cause.pdf
The voltage applied to our salinity sensor probes from Week 11 cause.pdf
 
The following contingency table shows opinion about global warming (n.pdf
The following contingency table shows opinion about global warming (n.pdfThe following contingency table shows opinion about global warming (n.pdf
The following contingency table shows opinion about global warming (n.pdf
 
The children at a certain school were asked what they prefer to drink.pdf
The children at a certain school were asked what they prefer to drink.pdfThe children at a certain school were asked what they prefer to drink.pdf
The children at a certain school were asked what they prefer to drink.pdf
 
Talk about comparative fitness of poikilotherms vs homeothermsSo.pdf
Talk about comparative fitness of poikilotherms vs homeothermsSo.pdfTalk about comparative fitness of poikilotherms vs homeothermsSo.pdf
Talk about comparative fitness of poikilotherms vs homeothermsSo.pdf
 
STERN m cr TORSO Tall mayil Long an Ribs Pamella fibula Qwalang eRVIc.pdf
STERN m cr TORSO Tall mayil Long an Ribs Pamella fibula Qwalang eRVIc.pdfSTERN m cr TORSO Tall mayil Long an Ribs Pamella fibula Qwalang eRVIc.pdf
STERN m cr TORSO Tall mayil Long an Ribs Pamella fibula Qwalang eRVIc.pdf
 
Project Management GB544What are some of the challenges in requi.pdf
Project Management GB544What are some of the challenges in requi.pdfProject Management GB544What are some of the challenges in requi.pdf
Project Management GB544What are some of the challenges in requi.pdf
 
Match the epithelial tissue with its appropriate name. Simple cu.pdf
Match the epithelial tissue with its appropriate name.  Simple cu.pdfMatch the epithelial tissue with its appropriate name.  Simple cu.pdf
Match the epithelial tissue with its appropriate name. Simple cu.pdf
 
Please read below case and individually take the role of “NGOsAdvoc.pdf
Please read below case and individually take the role of “NGOsAdvoc.pdfPlease read below case and individually take the role of “NGOsAdvoc.pdf
Please read below case and individually take the role of “NGOsAdvoc.pdf
 
Please change this method to recursive method.  public String post.pdf
Please change this method to recursive method.  public String post.pdfPlease change this method to recursive method.  public String post.pdf
Please change this method to recursive method.  public String post.pdf
 
Paul started a business with the following characteristics All sh.pdf
Paul started a business with the following characteristics All sh.pdfPaul started a business with the following characteristics All sh.pdf
Paul started a business with the following characteristics All sh.pdf
 
Name 2 organs andor glands, not membranes, which are found within (n.pdf
Name 2 organs andor glands, not membranes, which are found within (n.pdfName 2 organs andor glands, not membranes, which are found within (n.pdf
Name 2 organs andor glands, not membranes, which are found within (n.pdf
 
Mitochondria contain their own genome, are able to duplicate, and act.pdf
Mitochondria contain their own genome, are able to duplicate, and act.pdfMitochondria contain their own genome, are able to duplicate, and act.pdf
Mitochondria contain their own genome, are able to duplicate, and act.pdf
 
Match the term in column 1 to the definition in column 2.A.Atoll A.pdf
Match the term in column 1 to the definition in column 2.A.Atoll A.pdfMatch the term in column 1 to the definition in column 2.A.Atoll A.pdf
Match the term in column 1 to the definition in column 2.A.Atoll A.pdf
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 

Database security is critical but often developers are not prepar.pdf

  • 1. Database security is critical but often developers are not prepared for potential attacks find an article on a web based database that has been attacked or exploited summarize what happened and include URL. Database security is critical but often developers are not prepared for potential attacks find an article on a web based database that has been attacked or exploited summarize what happened and include URL. Solution Guardian jobs database attack demonstrates difficulties of database security One of the most popular job sites in Britain with more than ten million unique users. Managed by third-party job board software supplier Madgex, the cracked database contained names, e-mail addresses, covering letters and CVs. Widespread exposure Every year we share more of ourselves online- Each time we do any of these things, we place our data and our faith in commercial databases - Oracle, Microsoft SQL Server, IBM DB2, Sybase, MySQL - and the overarching security measures taken by the businesses that own these databases. the Guardian breach has alerted IT and security managers of the need to protect their user data and to consider data security from every angle. Most have already spent time, money and valuable resources securing their network perimeters with firewalls and anti-virus software, and even protecting their laptops with hard disc encryption and DLP solutions. It is a necessary step, but one which can also be guilty of generating a false sense of security. SQL vulnerability So how was The Guardian's data accessed? Well, all fingers point to an SQL injection vulnerability, a method currently in favour with hackers and data thieves. SQL injection attacks exploit vulnerabilities at the web application layer to access sensitive data in back-end databases. These web-based attacks pass undetected through firewalls and other perimeter defences, including intrusion detection and intrusion prevention systems, then hijack the application server to gain access to underlying database records. Yet databases remain vulnerable. Which prompts the question, just how many organisations are still open to this type of attack? And how many organisations do not understand that they are at risk. Continuous monitoring
  • 2. Until recently, identifying unauthorised or suspicious access to databases was impractical and complex. Logging all activity in the database itself significantly degrades system performance, while at the same time generating massive amounts of transaction records, which creates a "needle in the haystack" problem since all of the monitoring data must then be analysed and filtered to identify anomalous activity, typically using home-grown scripts. Big responsibility But why access The Guardian's job site at all? The answer is the first rule of hacking: because somebody discovered that they could. It may be argued that the theft of names, e-mail addresses, CVs and cover letters is relatively unimportant, almost unthreatening.The definition of sensitive data has broadened. Dates of birth, addresses, personal histories, details of daily lives - all this data is useful to a fraudster, and may be the first steps towards more complete identity theft. A deliberate attack that resulted in the theft of half a million personal records from a very high- profile organisation is not to be sniffed at. Any enterprise that holds any personal data needs to take every step to safeguard it. But it is not an easy job - just ask The Guardian. URL:http://www.computerweekly.com/opinion/Guardian-jobs-database-attack-demonstrates- difficulties-of-database-security