Preview

SEC435 Week 9 Discussion 2 - Database Penetration

Good Essays
Open Document
Open Document
392 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SEC435 Week 9 Discussion 2 - Database Penetration
Week 9 Discussion 2 Database Penetration
Please respond to the following:
• Describe the basic framework or make-up of any database. Discuss what makes databases important as well as a major target to hackers.
• Describe the most prominent signs that a database attack has occurred. Discuss the steps one would take to recover from such an attack. Explain how such attacks can be prevented.
Database penetration testing is the technique of testing a database for vulnerabilities to hacking attacks. This type of penetration testing uses techniques designed to address general database vulnerabilities as well as specific database issues such as those related to Microsoft SQL or Oracle servers. Port scanning is a basic technique used in database penetration, in which is the process of scanning a network or system to find accessible ports. Familiarity with port scanning techniques is important. However open ports are vulnerable to an intrusion by a hacker.
_______________________________________________________________________________________________________

Experiencing problems with the web site is the most prominent signs that a database, attack that can occur. The attack on a computer hosts are often zombie computers with broadband connections to the internet threat have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and direct the attack, often through a botnet/dosnet. Launching a DoS attack can have a negative impact on the business of an organization. The result of the attacker can lead to a loss of reputation along with economic losses. A successful DoS (Denial of Service) attack can disable computers and subsequently, an entire network. An attack launched by a moderately configured system can crash PCs that are of high value. The following steps should be followed when conducting a DoS penetration test: 1) Test heavy loads on the sever; 2) Check for systems and devices vulnerable

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To provide the quality that has customers returning for our service, we design the project by doing a penetration test at the end. This is because we assure all our jobs to be secured and free from exploitable vulnerabilities at the end. So, with the penetration test we will simulate a hacker and try everything to break into the network and steal information. If we are able to breach the network we will fix the vulnerability. This will continue until there is no more way for us to get in. The idea behind our strategy is that if we cannot get in, then hacker will not be able to get in either. This signifies a high standard of quality.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Summarize your paper by describing the database systems in your workplace, identifying which database systems and architecture they fall under.…

    • 644 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A(n) relational database management system provides protection for your data through the use of security, control, and recovery facilities. _________________________…

    • 585 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Bis221 Mel Johnson

    • 765 Words
    • 3 Pages

    A database stores information for any given reason and can be tracked back for any needed purpose.…

    • 765 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Assingment 1

    • 663 Words
    • 3 Pages

    2.1. A database system is made up of five major parts. Identify these parts. Provide specifics of what make up these components.…

    • 663 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We are running a penetration test from Jan. 1 to Jan. 15th, 2014 on the client’s ecommerce production environment.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Penetration Test plan

    • 869 Words
    • 4 Pages

    4. A test plan scope defining what is in scope and what is out of scope and why:…

    • 869 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Dbm 381 Week 1paper

    • 885 Words
    • 4 Pages

    A database is a structure that can store information about multiple types of entities, the attributes of those entities, and the relationships between the entities (Pratt & Adamski, 2012, Chapter 1). How data is received, stored, processed, and made available to others has an effect on the success or failure of an organization. The use of different architecture is a most to fit the needs of the organization, however the value of the data still remains in been able to access and extract information from the database system, and the only way this can be reached is by organizing, storing, and analyzing it effectively. For many organizations these systems have become an essential part of their structural and operational success.…

    • 885 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Week 3 iLab

    • 1035 Words
    • 6 Pages

    The last page of the lab assignment document contains a full-page topology. Remove this page and use it for reference to the topology and the IP addresses.…

    • 1035 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Penetration Plan

    • 2140 Words
    • 9 Pages

    This Vulnerability and Penetration Test Plan is designed specifically for E-commerce Sales and is designed to determine what steps need to be taken to secure and protect the network against malicious attacks. This Vulnerability and Penetration Test will cover numerous aspects of the E-commerce Sales information technology infrastructure including the production e-commerce web application server and the Cisco network. The e-commerce web application server will act as the external point of entry into the WAN and LAN where the following occurs:…

    • 2140 Words
    • 9 Pages
    Powerful Essays