Protecting your database

Database Intrusion Detection

Article from Issue 143/2012
Author(s):

Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.

When it comes to attacks against organizations, databases are generally the soft underbelly – easy to attack once you’re past the front line – and they usually hold all the really interesting data. But, databases are hidden behind firewalls, and only a complete fool would allow direct remote access to them, right? Right. But for a database to be useful, you generally have to make it available to users so they can interact with it.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News