SQL Injection Attacks and Prevention
“SQL Injection Attacks and Prevention” Please respond to the following:
From the e-Activities, describe the major concerns that information security professionals and SQL database administrators should have with SQL injection attacks
attacks. Additionally, provide the key reasons why you believe such attacks are popular among hackers, both malicious and ethical. Justify your response.
Suggest what you believe to be the two most critical best practices for protecting against SQL injection attacks, and establish whether or not you believe that there are significant efforts for security professionals who implement these best practices. Provide a rationale for your response.
Discuss any of the readings from the eActivity or the article from the Instructor Insight.
Discuss any relevant current event
Read the documentation titled, “Understanding SQL Injection,” by clicking the link here.
Original Source: Sammut, T., & Schiffman, M. (2013, April 5). Understanding SQL Injection. Retrieved from http://www.cisco.com/web/about/security/intelligence/sql_injection.html.
Read the article titled “SQL Injection Prevention Cheat Sheet,” by clicking the link here.
Original Source: Wichers, D., Manico, J., & Seil, M. (2014, April 12). SQL Injection Prevention Cheat Sheet. Retrieved from https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet.