Sql injections can be used to enter the database with

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ions can be used to enter the database with administrator rights, best way to avoid this is by using Java on the website. 5. If you can monitor when SQL injections are performed on an SQL database, what would you recommend as a security countermeasure to monitor your production SQL databases? Well coordinated and regularly audited security checks is the best way forward. 6. What can you do to ensure that your organization incorporates penetration testing and Web application testing as part of its implementation procedures? SQL Inject Me all...
View Full Document

This document was uploaded on 02/27/2014 for the course NT 2580 at ITT Technical Institute Chantilly campus.

Ask a homework question - tutors are online