System architecture for SQL injection and insider misuse detection system for DBMS

@article{Asmawi2008SystemAF,
  title={System architecture for SQL injection and insider misuse detection system for DBMS},
  author={Aziah Asmawi and Zailani Mohamed Sidek and Shukor Abd Razak},
  journal={2008 International Symposium on Information Technology},
  year={2008},
  volume={4},
  pages={1-6}
}
As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world… CONTINUE READING
10 Citations
18 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 18 references

Sql injection: Are your web applications vulnerable? Available at URL http://www.spidynamics.com/papers/SQLInjectionWhitePap er.pdf

  • K. Spett
  • 2005
Highly Influential
6 Excerpts

CSI/FBI Computer Crime and Security Survey

  • R. Power
  • Computer Security Issues & Trends
  • 2002
1 Excerpt

Guesswork Plagues Web Hole Reporting

  • K. Poulsen
  • URL http://online.securityfocus.com/news/346
  • 2002
1 Excerpt

Survey: Costs of computer security breaches soar

  • T. Hatcher
  • Available at URL http://www.cnn.com/2001/TECH…
  • 2001
1 Excerpt

The truth about internet fraud

  • M. Atanasov
  • Ziff Davis Smart Business. Available at URL
  • 2001
1 Excerpt

Similar Papers

Loading similar papers…