11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

18Securing Your Database ServerIn This Chapter●●●●OverviewA proven methodology for securing database serversAn explanation of the most common database server threatsSteps to secure your serverA reference table that illustrates a secure database serverThere are many ways to attack a database. External attacks may exploit configurationweaknesses that expose the database server. An insecure <strong>Web</strong> application may also beused to exploit the database. For example, an application that is granted too muchprivilege in the database or one that does not validate its input can put your databaseat risk.Internal threats should not be overlooked. Have you considered the rogueadministrator with network access? What about the database user tricked intorunning malicious code? For that matter, could any malicious code on the networkcompromise your database?This chapter begins by reviewing the most common threats that affect databaseservers. It then uses this perspective to create a methodology. This chapter then putsthe methodology into practice <strong>and</strong> takes a step-by-step approach that shows you howto improve your database server’s security.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!