01.08.2019 Views

Cyber Defense eMagazine August 2019

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Zero Day Attacks and not current WordPress or plugins allow Hackers to perform a data breach and steal<br />

confidential database data. A Zero Day Attack is the time between when a security vulnerability in a<br />

software plugin is published by the author and the updated plugin is applied to a web site to prevent a<br />

data breach. Hackers will be aware of the Zero Day vulnerability once it has been publicly announced.<br />

Hackers will now attempt to exploit it immediately to gain inside access to the Security Perimeter and<br />

steal confidential web site database data.<br />

Other content management system (CMS) such as Joomia and Drupal web sites are also vulnerable to<br />

data breaches by Hackers or Rogue Insiders for the same reasons. The 51.3% of Internet websites<br />

that don’t use a content management system likewise are vulnerable to database data breaches for many<br />

of the same reasons.<br />

How to Protect Confidential Web Site Database Data from Hackers or Rogue Insiders?<br />

Confidential web site database data includes: credit card, tax ID, medical, social media, corporate,<br />

manufacturing, law enforcement, defense, homeland security and public utility data. This data is almost<br />

always stored in Cassandra, DB2, Informix, MongoDB, MariaDB, MySQL, Oracle, PostgreSQL, SAP<br />

Hana, SQL Server and Sybase databases. Once inside the security perimeter commonly installed<br />

database utilities can be used by Hackers or Rogue Insiders to steal confidential database data.<br />

Non-intrusive network sniffing can capture the normal database query or SQL activity from a network tap<br />

or proxy server with no impact upon the database server. This SQL activity is quite predictable. Database<br />

servers servicing 10,000 end-users typically process daily 2,000 to 10,000 unique query or SQL<br />

operations that run millions of times a day.<br />

Advanced SQL Behavorial Analysis of the Web Site Database Query or SQL Activity<br />

Advanced SQL Behavioral Analysis of the web site SQL activity learns what the normal query activity is.<br />

Now from a network tap or proxy server the database query and SQL activity can be non-intrusively<br />

monitored in real-time and non-normal SQL activity immediately identified. Non-normal SQL activity from<br />

a Hackers or Rogue Insiders can be detected in a few milli seconds. The Hacker database session can<br />

be immediately terminated and the Security Team notified so that confidential database data is not stolen.<br />

Advanced SQL Behavioral Analysis of the query activity can go even further and learn the maximum<br />

amount of data queried plus the IP addresses all queries were submitted from for each of the unique SQL<br />

queries sent to a database. This type of data protection can detect never before observed query activity,<br />

queries sent from a never observed IP address and queries sending more data to an IP address than the<br />

query has ever sent before. This allows real-time detection of Hackers and Rogue Insiders attempting to<br />

steal confidential web site database data. Once detected the security team can be notified within a few<br />

seconds so that a data breach is prevented.<br />

143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!