1.What are some of the reasons why security patches might not be applied to databases?

2. What about the use of triggers and alters? How can monitoring all database access activity and usage patterns in real time assist in detecting data leakage, unauthorized SQL and Big Data transactions, and protocol and system attacks?

3. What type of testing can be done to detect these application vulnerabilities (such as injection)? The Open Web Application Security Project OWASP has some tools available for testing for injection vulnerabilities. What are some examples?



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *