Articles & Content
Topic: 2007 NA
Subtopic: DB2 for z/OS
DATE: 2007-5-7 (04:20 PM - 05:20 PM)
SPEAKERS: Aaron Newman (Application Security, Inc.)
DB2 attacks continue to grow in sophistication. Over the past year we have seen several advancements in the tools used to hack databases. Databases house some of an organization's most valuable assets. Yet the security of the database is often overlooked or trivialized. Securing your DB2 server is more than simply setting up permissions.Locking down DB2 involves understanding how the hacker's mind works. In this presentation, the speaker addresses several of the most overlooked topics on DB2 security and will be demonstrating several live attacks.Donít be left out in the dark on database security!
EXP. LEVEL: Intermediate
Learn about the most common security DB2 problems
Learn how attackers can take over a DB2 system
Learn how to properly lock down your DB2 database
Learn how web applications can be subverted
Learn about the resources hackers use
This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!Click to Download
NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.