Cross Platform DB2 for z/OS & LUW

Anatomy of a Database Attack (G04) 

May 12, 2009 03:00 PM

DATE: 2009-5-12 (02:45 PM - 03:45 PM)
SPEAKERS: Dean Ocampo (Imperva)

Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows... databases are vulnerable to a myriad of threats and attack vectors. This presentation will use live demonstrations to trace the steps involved in breaking into a database, and present a reference architecture and checklist for implementing iron-clad database security measures.

EXP. LEVEL: Intermediate


Understand the tools, process, and methods used to break into a database

Know what threats you need to address to secure your database

Have a checklist of security requirements for deploying an iron-clad database security architecture

Learn about resources for researching database security and audit issues

See a live database break-in and attack techniques

pdf file
NA09G04.pdf   4.93 MB   1 version
Uploaded - Jun 05, 2020

Related Entries and Links

No Related Resource entered.