Articles & Content


Anatomy of a Database Attack (G04)

Topic: Cross Platform DB2 for z/OS & LUW

Subtopic: 2009

DATE: 2009-5-12 (02:45 PM - 03:45 PM)
SPEAKERS: Dean Ocampo (Imperva)

Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows... databases are vulnerable to a myriad of threats and attack vectors. This presentation will use live demonstrations to trace the steps involved in breaking into a database, and present a reference architecture and checklist for implementing iron-clad database security measures.

EXP. LEVEL: Intermediate


Understand the tools, process, and methods used to break into a database

Know what threats you need to address to secure your database

Have a checklist of security requirements for deploying an iron-clad database security architecture

Learn about resources for researching database security and audit issues

See a live database break-in and attack techniques

Click Here to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.