Question

Write a 1 page paper outlining recent vulnerabilities in the RDBMS platforms Oracle, SQL Server and...

Write a 1 page paper outlining recent vulnerabilities in the RDBMS platforms Oracle, SQL Server and MySQL. Compare the quantity and types of vulnerabilities and the vendors response to patch them. Recommend one of the 3 vendors as being the best to respond to security vulnerabilities in their products.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

RECENT VULNERABILITIES IN RDBMS PLATFORMS -

Injection - It is one of the most popular vulnerabilities in RDBMS. It allows the third party to elevate privileges and gain access to a large functionality. Injection occurs when a user provides input for a query that changes the intended meaning of the query. It is a critical problem in the protection of the enterprise database. To stay clear of these vulnerabilities, the best way is to protect web-facing databases with firewalls. However, a lot of vendors have released fixes to prevent these problems.

Authentication - Authentication concerns itself with verifying a user's identity. This happens due to the incorrectly configured user and session authentication. This allows attackers to compromise passwords, keys or take control of user's accounts to assume their identities. This can be fixed by using multi-factor authentication. This greatly reduces the risk of compromised accounts.

Authorization - Authorization concerns itself with verifying a user's privileges. Organizations need to ensure privileges are not given to unauthorized users. Improper configuration or missing restrictions on authenticated users allow access to unauthorized functionality or data which includes private and sensitive information. Penetration testing is a method to prevent such kind of attacks.    

Data Leaks - Sensitive data is much more prone to be accessed by hackers. These data includes financial data, usernames and passwords, or health information. Organizations should never store sensitive data unencrypted. To avoid such a problem, an organization should use SSL- or TLS-encrypted communication platforms. All connections to the database should always use encryption.

Weak Username and Password - Using a weak/default username and password id one of the major vulnerabilities of compromisation of a database. The credentials are easy to be guessed and can be used to access sensitive information. It can be removed by adding proper checks to the web frontend while username and password creation.

The best vendor to respond to security vulnerabilities in their products is Oracle. It regularly releases patches and fixes to prevent the vulnerabilities. In the recent quarterly patch update, it has fixed a record 334 vulnerabilities across its products. As per a study, the average number of security patches has tripled in the last 4 years (from 113 to 334).

Add a comment
Know the answer?
Add Answer to:
Write a 1 page paper outlining recent vulnerabilities in the RDBMS platforms Oracle, SQL Server and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 1.Write a SQL statement for each of the following questions based on the above tables...

    Question 1.Write a SQL statement for each of the following questions based on the above tables (50 Points). 1) Create “Enrollment” table. 2) Change the credits of “Database” course from 2 to 3. 3) List the course titles (not Course_No) and grades John Doe had taken. 4) Calculate average of Café Balance, and name new field as Average Balance. 5) Create a roster for “Database” course (list student ID, last name, first name, major, and status for each student enrolled...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • 10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated...

    10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated sludge operation that adversely affect effluent quality with origins in the engineering, hydraulic and microbiological components of the process. The real "heart" of the activated sludge system is the development and maintenance of a mixed microbial culture (activated sludge) that treats wastewater and which can be managed. One definition of a wastewater treatment plant operator is a "bug farmer", one who controls the aeration...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Read this article. Then write a 250 word response on two of the programs you like...

    Read this article. Then write a 250 word response on two of the programs you like the most. Open source business intelligence software 1. BIRT BIRT is an open source BI program that CloudTweaks says is often viewed as the industry standard. BIRT boasts “over 12 million downloads and over 2.5 million developers across 157 countries.” Its users include heavyweights such as Cisco, S1, and IBM (which is also a BIRT sponsor). They also have maturity going for them, as...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT