by Christian Perry, Processor
Weak Web Applications Increasingly Fall Prey To This Potentially Devastating Attack
As security measures in data centers become progressively more stringent, hackers are turning to more unique methods to access sensitive data. One of these is SQL injection, which replaced cross-site scripting as the predominant Web application vulnerability in 2008, according to an IBM study.
Key Points
Organizations should implement real-time database activity monitoring technology to track all SQL transactions and continuously check for unusual or suspicious activity, such as a high volume of failed logins, an unusually high volume of queries in a given period of time, or the execution of SQL commands that are not typically executed by the organization's Web applications. |
No comments:
Post a Comment