Explore chapters and articles related to this topic
Substation Automation and Control
Published in Ramesh Bansal, Power System Protection in Smart Grid Environment, 2019
Adeyemi Charles Adewole, Raynitchka Tzoneva
Some common DoS countermeasures include the use of large bandwidth connections to ensure that the network can handle the traffic, distributed or redundant infrastructure, filtering routers, disabling IP broadcasts, applying security patches, disabling unused ports, and performing intrusion detection. Code injection can be made difficult by randomizing the system address space, separating code and data, and monitoring the stack to detect buffer overflows. To counteract SQL injection attacks, inputs should be checked for characters that can be abused, and users should be mandated to use a static template with certain inputs that can be translated into queries. Also, databases should have strict access controls for allowing users to modify or manipulate data.
Loopholes in IoT Security Services
Published in Syed Rameem Zahra, Mohammad Ahsan Chishti, Security and Privacy in the Internet of Things, 2020
Shafalika Vijayal, Salim Qureshi
SQL injection (SQLi) is a sort of an infusion attack that makes it possible to execute malignant SQL clarifications. Attackers can use SQL injection vulnerabilities to avoid application security endeavors. They can claim approval and endorsement of a webpage page or web application and recoup the substance of the entire SQL database. They can use SQL injection to incorporate, modify, and eradicate records in the database. A lack of protection against SQL injection may impact any webpage or application that uses a SQL database; for instance, MySQL, Oracle, SQL Server, etc. Criminals may use it to increment unapproved access to your delicate data: customer information, singular data, trade transactions, ensured advancement, to say the very least.
Applications of Blockchain Technology in Cyber Attacks Prevention
Published in Keshav Kaushik, Shubham Tayal, Susheela Dahiya, Ayodeji Olalekan Salau, Sustainable and Advanced Applications of Blockchain in Smart Computational Technologies, 2023
J. E. T. Akinsola, M. A. Adeagbo, S. A. Akinseinde, F. O. Onipede, A. A. Yusuf
SQL injection is an unforeseen consequence or attack like authorization of mechanisms and circumvention of authentication that occurs when specifically constructed input can provoke an application into mis-constructing a database command allowing modification, deletion, retrieving and addition of attack and records compromising the integrity of a database and the applications it provides (Chen et al., 2018). Availability, integrity, confidentiality and functionality of any web application databases are threatened by Structured Query Language Injection Attack (SQLIA). Dynamic leakage, static leakage, spoofing and linkage leakage are other examples of attack that endanger database security (Abimbola & Zhangfang, 2020).
Development of testbed for cyber-manufacturing security issues
Published in International Journal of Computer Integrated Manufacturing, 2020
Mingtao Wu, Jinwoo Song, Snehav Sharma, Jupeng Di, Benliu He, Ziming Wang, Jingkai Zhang, Long Wang Lucas Lin, Emily Ann Greaney, Young Moon
With the SQL injection attack, the intruder can spoof identity, download existing data or upload malicious data to any SQL database with the injection vulnerability. In the CSST, the intruder can spoof into the MySQL 5.7 customer database without knowing the customer’s password when the ‘magic quote’ countermeasure is turned off. For example, the CMS customer with username ‘UID001’ and password ‘1234’ can log in to the system and upload designs or requirements for fabrication. However, an intruder can use the code ‘UID001ʹ;–’ without any password to log into the account as well. The intruder can have full access to download, edit, upload, or remove the customers’ orders.