UNIVERSITI KUALA LUMPUR
Session January 2012
IKB10103 INFORMATION SECURITY
Date Submission: 6 feb 2012
MADAM HERNY RAMADHANI BT MOHD HUSNY
Table of Content
Database Communication Vulnerabilities
Backup Data Exposure
Database Communication Protocol Vulnerabilities
A rising number of security weaknesses are being identified in the database communication protocols of all database vendors. What happens is that, vendor relies heavily on proprietary network protocol to communicate data and commands. Therefore, they tend to create out complex and mostly obscure protocols are prone to security vulnerabilities .4 out of 7 security fixes address protocol vulnerabilities.
Tampering with Database related network protocol messages.
1) Causes Unauthorized Data Access and Manipulation
2) Denial Of Service
1) Technology such as protocol validation helps dissembles database traffic and compares it to expectation. A block/ alerts may be taken if such live traffic does not match the expectation. This causes only normal client generated message to enter.
2) Technology such as reactive validation also has the basis of protocol validation. But its only effective to address known to the user. It will check for the specific known attacks and react quickly to it such as alerts or block.
Weak authentication will allow attackers to assume the identity of legitimate database users by stealing or otherwise obtaining login credentials by any means necessary. An attacker may employ any number of strategies to obtain ways to get into the database.... [continues]
Cite This Essay
(2012, 03). Information Security. StudyMode.com. Retrieved 03, 2012, from http://www.studymode.com/essays/Information-Security-950697.html
"Information Security" StudyMode.com. 03 2012. 03 2012 <http://www.studymode.com/essays/Information-Security-950697.html>.
"Information Security." StudyMode.com. 03, 2012. Accessed 03, 2012. http://www.studymode.com/essays/Information-Security-950697.html.