Articles & Content


Anatomy of a DB2 Attack (C08)

Topic: 2006 EU

Subtopic: DB2 for LUW

DATE: 2006-10-3 (16:45 - 17:45)
SPEAKERS: Aaron Newman (Application Security, Inc.)

Databases house some of an organization's most valuable assets. Yet the security of the database is often overlooked or trivialized. Securing you DB2 server is more than simply setting up permissions. Locking down DB2 involves understanding how the hacker's mind works. In this presentation, the speaker addresses several of the most overlooked topics on DB2 security and will be demonstrating several live attacks.

EXP. LEVEL: Intermediate


Learn about the most common security DB2 problems

Learn how an attackers takes over a DB2 system

Learn how to properly lock down your DB2 database

Learn how web applications can be subverted

Learn about the resources hackers use

This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!

Download File
Click to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.