Anatomy of a Database Attack

Anatomy of a Database Attack

Cover
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows… databases are vulnerable to a myriad of threats and attack vectors.

Imperva CTO Amichai Shulman will use live demonstrations to trace the steps involved in breaking into a database, and present a reference architecture and checklist for implementing iron-clad database security measures. Specific topics covered during this webinar include:

  • The 5 Steps for Attacking a Database
  • Key tools for obtaining database credentials such as Brute Force and Exhaustive Search
  • Primary database attack methods such as Lateral SQL Injection and Buffer Overflow
  • Covert tactics used by database attackers to cover their tracks and avoid detection
Vendor:
Imperva
Premiered:
Nov 12, 2009
Format:
Multimedia
Type:
Webcast
Language:
English
Already a Bitpipe member? Login here

Download this Webcast!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy