sponsored by Imperva
Posted:  19 Aug 2009
Published:  20 Feb 2009
Format:  PDF
Length:  3  Page(s)
Type:  Technical Article
Language:  English
A good detective understands the criminal mind, techniques, and tools of the trade. To protect your database and prevent it from becoming a crime scene, it is crucial to understand the common methods of attack, data theft, and cover-up techniques. The suspect line-up can come from outside hackers and from within the ranks of trusted employers, contractors, and partners. Some threats are easily prevented or contained, while others are more elusive. Fortunately, many of the security mechanisms and tools required to protect databases are readily available.

Check out this brief article to learn about attacks, methods, and tools used by internal and external hackers to exploit database vulnerabilities and engage in data theft. This article also provides helpful best practices you can employ to help protect your database.

Access Control | Access Rights | Data Loss Prevention (DLP) | Data Security | Database Security | Hackers | Security Threats | SQL

View All Resources sponsored by Imperva

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement