preview

Annotated Bibliography On Sql Injection

Better Essays

SQL Injection
11/17/2014

name: Seth Clemens pseudonym: Tazmania deterlab: ru245ag
Department of Computer Science, ITEC 345
Radford University
Radford, United States of America sclemens@radford.edu Abstract – With data, now more than ever, being stored on databases instead of in filing cabinets, the awareness of SQL Injection attacks need to be raised. The goal of this document is to provide a basic understanding of SQL attacks, how they are executed, and what preventative measures can be taken to prevent such a dangerous attack from happening.

I. INTRODUCTION
Before computers were invented, humans would store data in filing cabinets, safes, libraries, and other such places. However, the method of storing data changed when computerized databases were invented in the 1960’s [4]. Storing data in a digital database became more of a time and cost efficient method over storing data in filing cabinets or other like places. Computerized databases provide the user, or users, the ability to access, add, or remove data in a matter of seconds rather than the possible hours it could take, going through hundreds of physical folders.
Databases are normally used by businesses and schools to store their data. These databases are kept secure, and users can only access the information stored on the database they have been granted access to. Now data is added to, accessed, or remove from a database using languages such as SQL (Structured Query Language), MYSQL (My Sequel), etc.

Get Access