Anatomy of a Database Attack

Anatomy of a Database Attack

Cover
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows… databases are vulnerable to a myriad of threats and attack vectors.

Imperva CTO Amichai Shulman will use live demonstrations to trace the steps involved in breaking into a database, and present a reference architecture and checklist for implementing iron-clad database security measures. Specific topics covered during this webinar include:

  • The 5 Steps for Attacking a Database
  • Key tools for obtaining database credentials such as Brute Force and Exhaustive Search
  • Primary database attack methods such as Lateral SQL Injection and Buffer Overflow
  • Covert tactics used by database attackers to cover their tracks and avoid detection
Vendor:
Imperva
Premiered:
Nov 12, 2009
Format:
Multimedia
Type:
Webcast
Language:
English
Already a Bitpipe member? Login here

Download this Webcast!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor