Sql Injection

Submitted by: Submitted by

Views: 10

Words: 415

Pages: 2

Category: Business and Industry

Date Submitted: 10/22/2016 04:12 PM

Report This Essay

SQL Injection

Reagan Amos

Grantham University

SQL Injection

SQL injection is a malicious code used in an attack by inserting the code in strings used for an execution on data-driven applications. A SQL injection can be used to bypass any authentication to access an entire database. The injections can give a hacker with unauthorized access to sensitive data and private data. They also can be used to modify, delete, or add unwanted material to a database. It can also affect an entire website or application that uses SQL database. SQL injection can only exist if there is a relational database that uses SQL or a user controllable input which directly use an SQL query available.

To avoid a SQL injection attacks, checking for familiar data by validating it. Meaning validating the type, length, format, and range. Using a safe SQL parameter for data access. By using SQL parameter with constructed SQL command string. Using an account that has restricted permissions. Only grant execute permissions to certain stored procedures in the database and restrict direct table access. Database error information should be kept private. Avoid letting the user know about detected database errors. The SQL injection can be very dangerous when used by the wrong person.

You can prevent SQL injection if you adopt an input validation technique in which user input is authenticated against a set of defined rules for length, type and syntax and also against business rules. You should ensure that users with the permission to access the database have the least privileges. Additionally, do not use system administrator accounts like “sa” for web applications. Also, you should always make sure that a database user is created only for a specific application and this user is not able to access other applications. Another method for preventing SQL injection attacks is to remove all stored procedures that are not in use. Use strongly typed parameterized query APIs with placeholder substitution...