Loading
Notes
Study Reminders
Support
Text Version

Database Security Concepts - Lesson Summary

Set your study reminders

We will email you at these times to remind you to study.
  • Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +

The key points from this module are:

Database Security

Databases are the crown jewels of information within every organization. They are the second most common target of insiders.

SQL

SQL injection is a security exploit where an attacker adds structured query language code into a web form input to gain access to resources or modify data in the database.

Database Inference Attacks

The inference is a data mining method used to identify information hidden from normal users and an inference attack can compromise the integrity of an entire database.

Emerging Technologies

Cryptographic bit splitting and other emerging technologies constitute the algorithms that split a stream of bits into a number of shares.

Baselining

In configuration management, a baseline is an agreed-upon description of the attributes of a product at a point in time which servers as a basis for defining change.

Hardening

In computing, hardening is the process of securing a system by reducing its surface vulnerability.

MySQL Database Lab Build

Building a MySQL lab environment will help remove anonymous users, make sure that you have a root password set, disallow root login remotely, and modify some of the authorization tables.

Oracle Database Audit Configuration
The audit process entails running a vulnerability scanner to locate the gasps, followed by some kind of pen testing to search for potentially exploitable vulnerabilities.

PosgreSQL Architecture
The architecture of PostgreSQL includes the client, a component called the postmaster, the backend, configuration files, and the data files.