This website uses cookies to ensure you have the best experience. Learn more

Web And Database Attacks Essay

1969 words - 8 pages

Within the past decade, there has been a tremendous growing need for web servers and databases; also their related service and the two concepts have hit the headlines as the most researched knowledge domains in the technology sphere. Subsequently, this has revolutionized the way many people interact with one another through effective information sharing. This rapid spread and the management effectiveness of advanced technologies are establishing great opportunities for development of distributed system at a large scale. Although, this remarkable growth has also come with some security concerns which need to be carefully handled because some of data available in these platforms is really ...view middle of the document...

These areas of application may include but not limited to; Government to records information such as statistics, election information and tax records among others; Police for criminal records management; Banks to store, track and analyze all customers and their related transactions; Motor vehicle department to keep driver’s and vehicle’s records and history.
In respect to the discussed, these two concepts are phenomenal in the current technological error we are living in. They are diverse in technology adoption and need sophisticated platforms to implement them. For instance, with database implementation, exist a set of software tools commonly referred to as Databases management systems (DBMS) which assist in accessing, organizing, storing, managing, retrieving and maintaining data in a database. The same functions apply to the web server software tools as they perform their intended function of serving contents using HTTP protocol. The only difference which presents is the model used in data representation or structure adopted in dissemination of data; hierarchical, network, or entity-relationship model, distributed, flat file etc.
This data representation is the most critical aspect in determining and ensuring the security of the web server and databases platforms. Some models or types are vulnerable to web attacks than others depending on the data structure in place. To understand how these attacks relate to web servers and databases, this paper critically analyses the attacks and threats to the concepts security and what model/type(hierarchical, networked, relational, object oriented, distributed) is vulnerable to what attack.
Web and database security threats can be grouped in two distinct sets; logical and physical threats. Physical threats comprise but not limited to password forced disclosure, theft, power failures, and destruction of storage devices. On the other hand logical attacks involve unauthorized access to information usually through use of 3rd party software.
One of the largest threats to a web server or database is a malicious authorized user whereby such user can justifiably have access confidential information. This information can be leaked to the user either electronically or by other traditional means like use of the word of mouth and little can be done to prevent this from within the DBMS or web server software. Use of mandatory access controls or access control list whereby one issues users with certain limitation in the access privileges for users can work out to secure the said systems.
Another way to compromise a web server and database is to successfully log in as a legitimate user. This can be done by physically stealing the information or monitoring network traffic for login information. Another way could involve accessing password lists stored in an operating system. The database must set up authentication and encryption measures to ensure that this type of attack is less likely to occur. The web server could be...

Find Another Essay On web and database attacks

role of database administrator Essay

1611 words - 7 pages administrators are the link between the success of themselves, the company and every user with their technical skills in information technology. Works Cited “Database Administrator.” Tech Directions 70.2 (2010): 24-25. Academic Search Complete. Web. 10 May 2014. MOREN, DAN. "THE Iphone." Macworld 30.11 (2013): 58-60. Academic Search Complete. Web. 13 May 2014. Perelman, Deb. “The Job of Securing the Database.” Eweek 24.30(2007): 22-24. Academic Search Complete. Web. 10 May 13, 2014.

Tony's Chips Essay

2367 words - 10 pages database-driven web applications can eventually require many different servers. This can be a problem for some companies that do not have the logistical capabilities to store these servers on-site. Consider that these servers will take up space, require appropriate cooling, and warrant a sophisticated fire-suppression system. A server farm service will have all of this in place all ready at no additional cost to the client. When dealing with

Structure of Web-Based UMS Using SOA

1212 words - 5 pages prevent internal systems from unauthorized attacks from the internet. One of the greatest advantages of this design is that only an internet browser is required on the client side to display interface and requested responses. 4.1.GIS Web Service The crucial component in SOA is web service (Reviewed in Section 2.2). Specifically for this project the web service consists of vector data web service and aerial photo web service. The vector data

Securing Networked Computers for Global Defense

1982 words - 8 pages . Unfortunately, while the Internet expands and these new opportunities present themselves, opportunities also pop up for some users to abuse the integrity of new systems. These users exploit the freedoms of advanced development and design attacks against others. Web 2.0 is a popular target for hackers due to the mass amount of users that are able to access it, and the possibility for various methods of intrusion. “Black hat” hackers actively

Privacy and Security Issues in Data Mining

2342 words - 10 pages to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level. Informational Privacy Issues in Web-data Mining There is a debate between the benefits

Access is an excellent tool

638 words - 3 pages History of database(English) 100% match : root : Sciences : Computer Science" . . . History of database Note! The sentences in this essay are shuffled. If you want to read the essay in it's proper state, click here. The SQL standard passed from IBM to ANSI and the ISO, which formed a working group to continue its development First to Market Despite IBM being the company that invented ..."The Changing Role of the Database Administrator(English

Database In The Real-world

996 words - 4 pages In today’s digital era, our life seems easier because of its technologies. Computer technology is the most influential among others. It supports anything that related to the new inventions and innovations. One of important role in computer technology is a database. Although database is not as popular as web application in computer technology innovations, it determines whether such application system is good or not. Database is ‘a shared

Hacker Tools

1064 words - 5 pages to Margaret Rouse, “Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability” (2007). SQL Script Injection Databases use a common language for the handling of data requests called Structured Query Language (SQL). A SQL Script Injection attack works by inserting commands that are always true into a query. When the database server validates

sql injection

5877 words - 24 pages sensitive data. With improved performance of database server s most of the web applications use RDBMS (Relational Database Management Systems). And the web applications allow its valid users to either store/edit/view the data stored in RDBMS through the interface coded by the application programmers. Traditionally programmers have been trained in terms of writing code to implement the intended functionality but they are not aware of the security aspects

Oracle Database Analysis

768 words - 3 pages management.The built-in Enterprise Manager 10g Database Control console provides a web-based interface that shows at a glance, the current status of your database and cluster environment, and allows database administration actions from any browser connected to one's system.All Data, All Applications:As a full featured edition of Oracle's industry leading database, Oracle Database 10g Standard Edition One supports all standard relational data

Why is Database Security So Important?

2149 words - 9 pages configuration path that can be assumed by DBA’s, but a clear understanding of what is necessary versus unwanted must be carved out prior to beginning and installation. Planning and understanding what is desired in the operation of database can reduce risk of zero-day attacks, but it can also simplify database patch management, which leads me to the final element of the three primary database hardening components. Patches to database applications are

Similar Essays

Web Server Application Attacks Essay

991 words - 4 pages Introduction There are more Web application vulnerabilities than one can even count, and they have become so widespread that most hacking sites have tools that you can download to search, find, and exploit tools these vulnerabilities. This makes it very easy for even a rookie hacker to exploit these flaws. The three common web application vulnerabilities and attacks are as follows: Username enumeration, Security misconfiguration, and SQL

Team Dynamo Essay

817 words - 4 pages robust security assessment tool commercially available through website downloads. The Acunetix tool’s key features include port scanner, HTTP sniffer, SQL injection tool, and a penetration tester capable of identifying a variety of potential website vulnerabilities including susceptibilities to buffer overflow and cross-site scripting (XXS) attacks (Acunetix, n.d.). Similar to the Acunetix web scanner, the QualysGuard Freecan tool is also a robust

An Introduction To Access Control Mechanisms

2739 words - 11 pages Abstract: With increasing attacks and internal data theft the organizations must strengthen their database security beyond the traditional methods, especially those databases which hold private data. This can be done by developing a security strategy which is a framework of control mechanisms for authentication, authorization, and access control mechanisms to enforce role separation, database auditing, monitoring, network and data encryption

A Look At Database Processing Applications

1445 words - 6 pages system, in order to be successful called a database processing application. Database processing applications can be defined by their history, environment as well as web processing application. In order to understand database processing application, first we must look at the history of database processing and how it evolved in the technology world. Originally database processing was used in major corporations and large organizations as the basis