States of data
Database vulnerabilities
Buffer overflows
Crashing server by storing big thing in small place
Forgotten options
Weak documentation/redundancy of staff etc
Error log
Store any errors that occur
Access Log
Store any attempts to access the system
Lack of input validation
Santise data in input fields before saving. Never trust the user.
Passive Threats
Threat to confidentiality
- Unauthorised person may listen to sensitive comms
Active Threats
Threats to integrity
- Unauthorised person may alter/delete information
Cryptanalysis
Apps for locating databases on the network
Denial of Service
Intended to make data server unavailable/unable to respond to requests.
Distributed DoS
Uses lots of systems to conduct a Denial of Service attack
SQL Injection
Exploit “holes” in a Web application to run rogue SQL commands.
Done by placing special characters into existing SQL commands to achieve desired results.
Avoiding SQL Injection
Backdoor
Runs in a hidden process to give attacker port to connect to this system.
Ransomware
Locks up a PC etc for a price.
Cloud Computing Security Issues
ARL
Misconfiguration Risks
Network based risks
Client Side risks
Key
bigger key = better, 1025bit min
Symmetric Encryption
Shared key - one key
Relies on secrecy of key
Asymmetric Encryption
Public key encryption - two keys