Please respond to the following:
• Describe the basic framework or make-up of any database. Discuss what makes databases important as well as a major target to hackers.
• Describe the most prominent signs that a database attack has occurred. Discuss the steps one would take to recover from such an attack. Explain how such attacks can be prevented.
Database penetration testing is the technique of testing a database for vulnerabilities to hacking attacks. This type of penetration testing uses techniques designed to address general database vulnerabilities as well as specific database issues such as those related to Microsoft SQL or Oracle servers. Port scanning is a basic technique used in database penetration, in which is the process of scanning a network or system to find accessible ports. Familiarity with port scanning techniques is important. However open ports are vulnerable to an intrusion by a hacker.
Experiencing problems with the web site is the most prominent signs that a database, attack that can occur. The attack on a computer hosts are often zombie computers with broadband connections to the internet threat have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and direct the attack, often through a botnet/dosnet. Launching a DoS attack can have a negative impact on the business of an organization. The result of the attacker can lead to a loss of reputation along with economic losses. A successful DoS (Denial of Service) attack can disable computers and subsequently, an entire network. An attack launched by a moderately configured system can crash PCs that are of high value. The following steps should be followed when conducting a DoS penetration test: 1) Test heavy loads on the sever; 2) Check for systems and devices vulnerable