Like This Site? 
 
RSS Feed Follow Us 

on Twitter! Be Our Fan!

Understanding Database Vulnerabilities

Share this post!
 Vote this!



Database is one of the most integral components of any system, and keeping data both secure and accessible is a demanding task every business is facing today. One of the more recent trends in enterprise security has been the movement away from protecting the perimeter of the network to protecting data at its source. Today’s corporate environment must provide access to data not only to its employees, but also to partners and customers located on separate networks, potentially thousands of miles away. In order to protect the database system, one must first understand its vulnerabilities. In general, database vulnerabilities fall into the following groups:

Vendor Bugs

Vendor bugs are code exceptions and buffer overflows that allow executing malicious commands. These are usually fixed by patches and configuration updates. To remove this vulnerability, you must stay current on the program updates and patches and install them as soon as they are released.

More... 

0 comments:

Post a Comment