This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ions can be used to enter the database with administrator rights, best way to avoid this is by using Java on the website. 5. If you can monitor when SQL injections are performed on an SQL database, what would you recommend as a security countermeasure to monitor your production SQL databases? Well coordinated and regularly audited security checks is the best way forward. 6. What can you do to ensure that your organization incorporates penetration testing and Web application testing as part of its implementation procedures? SQL Inject Me all...
View Full Document
This document was uploaded on 02/27/2014 for the course NT 2580 at ITT Technical Institute Chantilly campus.
- Spring '14