Posts Tagged ‘database’

Hackers attackProtection of databases is one of the easiest tasks. This is due to the fact that databases have a well-defined internal structure, and operations on the elements of the DBMS is quite clearly defined. There are four main steps – search, insert, delete and replace the item. Other operations are complementary and are fairly rare. The presence of strong and well-defined structure of operations simplifies the problem of protecting databases. In most cases, hackers prefer to crack the protection of the computer system at the operating system and access the database files through the operating system. However, if you use a database that does not have sufficiently robust defense mechanisms, or poorly tested version of the database that contains the error, or if the security policy database administrator mistakes had been made, it is quite possible to overcome the hacker protection, implemented at the level of the DBMS. (more…)