Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Applied

SQL injection attacks and mitigations

Computer application security capstone project

Title: SQL injection attacks and mitigations

Project Report , 2018 , 22 Pages , Grade: 3.91/4

Autor:in: Tanmay Teckchandani (Author)

Computer Science - Applied
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

Structured Query Language Injection is one of the vulnerabilities in OSWAP Top 10 list for web-based application exploitation. In this study, we will be demonstrating the different methods of SQL injection attacks and prevention techniques will be illustrated.

Web application are widespread as they have become the necessity for the everyday life. Most web-based applications communicate with a database using a machine-understandable language called Structured Query Language (SQL).

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted from the client of the application.

Excerpt


Table of Contents

  • INTRODUCTION
    • PROBLEM STATEMENT
    • SIGNIFICANCE
    • RESOURCES
  • SUMMARY: WEB SEARCH AND LITERATURE
  • METHODOLOGY
  • RESULTS AND DISCUSSION
  • CONCLUSION AND RECOMMENDATIONS
  • SUMMARY
  • REFERENCES

Objectives and Key Themes

This study aims to raise public awareness regarding SQL injection vulnerabilities and their potential impact on web-based applications. It explores the methods used in SQL injection attacks, the reasons for their effectiveness, and the prevention techniques that developers should employ to mitigate the risks.

  • Understanding SQL injection attacks and their mechanisms.
  • Highlighting the significance of SQL injection as a prevalent and potentially devastating security threat.
  • Examining the consequences of SQL injection attacks, including data breaches and compromised user credentials.
  • Exploring the impact of SQL injection vulnerabilities on different types of web applications.
  • Presenting best practices and preventative measures for developers to reduce the risk of SQL injection vulnerabilities.

Chapter Summaries

  • INTRODUCTION: This section provides a concise introduction to SQL injection, explaining its position within the OWASP Top 10 list of web application vulnerabilities. It further discusses the prevalence of web applications in modern life and their reliance on SQL databases.
  • PROBLEM STATEMENT: This chapter elaborates on the objectives of the study. It defines the goals of raising public awareness about SQL injection, its impact on web applications, and the crucial need for developers to address its vulnerabilities.
  • SIGNIFICANCE: This section highlights the significance of SQL injection as a security threat. It details how attackers can exploit web applications to manipulate SQL queries, leading to data breaches and compromising sensitive information such as usernames, passwords, and encryption keys.
  • SUMMARY: WEB SEARCH AND LITERATURE: This chapter delves into the research process. It discusses the methods used to gather information on SQL injection attacks and their mitigation techniques from relevant sources, including academic papers and online resources.

Keywords

The primary keywords and focus topics of this study include: SQL injection, web application security, database vulnerabilities, data breaches, user authentication, authorization, data integrity, OWASP Top 10, prevention techniques, mitigation strategies, code injection, and web development security.

Excerpt out of 22 pages  - scroll top

Details

Title
SQL injection attacks and mitigations
Subtitle
Computer application security capstone project
Grade
3.91/4
Author
Tanmay Teckchandani (Author)
Publication Year
2018
Pages
22
Catalog Number
V461503
ISBN (eBook)
9783668944985
ISBN (Book)
9783668944992
Language
English
Tags
computer
Product Safety
GRIN Publishing GmbH
Quote paper
Tanmay Teckchandani (Author), 2018, SQL injection attacks and mitigations, Munich, GRIN Verlag, https://www.grin.com/document/461503
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  22  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint