Access your Pro+ Content below.
Basic Database Security: Step by Step
This article is part of the Information Security magazine issue of December 2009
SQL injection and buffer overflows are database vulnerabilities that have been exploited for more than a decade, yet they remain common attack vectors in compromising database systems, even when patches and workarounds exist. Attackers also burrow their way in using default user account names and passwords; all the while, database administrators and IT professionals complain about the costs of provisioning user accounts. And finally, through public breach disclosures we learn that unencrypted tapes are lost or sensitive data is regularly moved to unsecured systems. Clearly we're still missing the basic steps for securing database systems. So forget fancy encryption techniques, event correlation or forensic analysis. Instead, organizations, especially in this troubled economy, need a clear, actionable and pragmatic approach to database security. Unfortunately the essentials are often overlooked in large organizations and appear overwhelming to database professionals who don't know quite where to start. We want to make it simple. ...
Access this PRO+ Content for Free!
Features in this issue
Google says Chromium's process isolation and sandbox security features harden the OS from attack.
Use this checklist to ensure you're following the basics for securing database systems.
Enterprises need to make sure a SaaS provider has the proper security controls to protect sensitive data before a contract is signed
Forget structure-driven policy architecture; we'll show you how to build information security policy artifacts using a taxonomy approach that will help you build global policies in a snap.
Columns in this issue
The HITECH Act, part of the economic stimulus bill, is intended to foster electronic medical records systems adoption, but will also introduce security and privacy risks to patient medical and billing data.
Six months since President Obama announced he would appoint a cybersecurity coordinator, the position sits vacant. Do you care?