Protecting your database

Database Intrusion Detection

Article from Issue 143/2012

Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.

When it comes to attacks against organizations, databases are generally the soft underbelly – easy to attack once you’re past the front line – and they usually hold all the really interesting data. But, databases are hidden behind firewalls, and only a complete fool would allow direct remote access to them, right? Right. But for a database to be useful, you generally have to make it available to users so they can interact with it.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Intrusion 101

    You need to think like an attacker to keep your network safe. We asked security columnist Kurt Seifried for an inside look at the art of intrusion.

  • Insecurity News
  • Security Lessons: Windows Logging

    Windows 7 is pretty good at logging, but what do you do with all those log files? We look at some monitoring tools that can help you get the most out your logging data.

  • MySQL Workbench 5.1

    A small database is easy to plan on paper, but the structure quickly becomes more complex as you add more elements. MySQL Workbench can help you keep the tables arranged.

  • Snort

    Search out hidden attacks with the Snort intrusion detection system.

comments powered by Disqus

Direct Download

Read full article as PDF:

048-049_kurt.pdf (177.55 kB)