Unformatted text preview: ions can be used to enter the database with administrator rights, best way to avoid this is by using Java on the website. 5. If you can monitor when SQL injections are performed on an SQL database, what would you recommend as a security countermeasure to monitor your production SQL databases? Well coordinated and regularly audited security checks is the best way forward. 6. What can you do to ensure that your organization incorporates penetration testing and Web application testing as part of its implementation procedures? SQL Inject Me all...
View Full Document
- Spring '14
- World Wide Web, Web server, web applications, Code injection