In most developed systems which are based on the B/S
Developing Model, the database access is the most
important step. DBMS joins the data operations of any
information systems, especially the development of queries
which is on the base of SQL. In the network security system,
SQL injection attacks can join the top ranks of all the
attacks. And to this kind of attacks, we must allow the front
connections from the Internet to the Web server because the
firewall must make sure that the users can access the
network application programs. Therefore, once the network
application programs have the injection flaws, the attackers
can access the databases directly and even can get the access
privileges to the server of databases. So in some situations,
the risk of SQL injection attacks is higher than any other
flaws.
In most developed systems which are based on the B/S
Developing Model, the database access is the most
important step. DBMS joins the data operations of any
information systems, especially the development of queries
which is on the base of SQL. In the network security system,
SQL injection attacks can join the top ranks of all the
attacks. And to this kind of attacks, we must allow the front
connections from the Internet to the Web server because the
firewall must make sure that the users can access the
network application programs. Therefore, once the network
application programs have the injection flaws, the attackers
can access the databases directly and even can get the access
privileges to the server of databases. So in some situations,
the risk of SQL injection attacks is higher than any other
flaws.
การแปล กรุณารอสักครู่..
