tailieunhanh - Top Ten Database Security Threats - How to Mitigate the Most Significant Database Vulnerabilities

But even with convenient classifications and labels ready to apply, we are still asking the user to become a filing clerk – manually annotating every document, email, photo, or conversation. We have worked on improving the tools, and to a degree they work, but to provide higher coverage of the collection more must be done automatically. The first, easy step is to stop throwing out any potentially useful metadata. Time is probably the most important attribute in our database, yet some photo-editing programs erase the value for date taken. Just having time and location, would be a stride forward. Even. | Top Ten Database Security Threats How to Mitigate the Most Significant Database Vulnerabilities Written by Amichai Shulman Co-founder CTO Imperva Inc. The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva s Application Defense Center. Background information general risk mitigation strategies and an overview of Imperva s SecureSphere Database Security Gateway protections are provided for each threat. ĨMPERXA Top Ten Database Security Threats White Paper Introduction The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva s Application Defense Center. Background information general risk mitigation strategies and Imperva s SecureSphere Database Security Gateway protections are provided for each threat. Top Ten Database Security Threats 1. Excessive Privilege Abuse 2. Legitimate Privilege Abuse 3. Privilege Elevation 4. Database Platform Vulnerabilities 5. SQL Injection 6. Weak Audit Trail 7. Denial of Service 8. Database Communication Protocol Vulnerabilities 9. Weak Authentication 10. Backup Data Exposure By addressing these top ten threats organizations will meet the compliance and risk mitigation requirements of the most regulated industries in the world. Page 2 Imperva Inc. White Paper Top Ten Database Security Threats Threat 1 - Excessive Privilege Abuse When users or applications are granted database access privileges that exceed the requirements of their job function these privileges may be abused for malicious purpose. For example a university administrator whose job requires only the ability to change student contact information may take advantage of excessive database .