Ask a question from expert

Ask now

Data and System Security Name of the University Author's Note

8 Pages1691 Words422 Views
   

North American University

   

Data and System Security (INST569)

   

Added on  2020-03-04

About This Document

SQL Injection is a code mixture procedure that enterprises' security shortcoming that occurs in the database layer of a software application. Buffer overflow alludes to any case in which a program composer past the finish of the memory designated for any support including on the load, and not simply on the stack.  For instance, while coding if any coder composes past the finish of an array apportioned from the heap, at that point the coder has caused a buffer overflow.

Data and System Security Name of the University Author's Note

   

North American University

   

Data and System Security (INST569)

   Added on 2020-03-04

BookmarkShareRelated Documents
Running head: DATA AND SYSTEM SECURITYData and System SecurityName of the StudentName of the UniversityAuthor’s noteTable of Contents
Data and System Security Name of the University Author's Note_1
1DATA AND SYSTEM SECURITYAnswer to question 1:.....................................................................................................2Answer to question 2:.....................................................................................................2Answer to question 3:.....................................................................................................2Answer to question 4:.....................................................................................................2Answer to question 5:.....................................................................................................3Answer to question 6:.....................................................................................................3Answer to question 7:.....................................................................................................4Answer to question 8:.....................................................................................................4Answer to question 9:.....................................................................................................5Answer to question 10:...................................................................................................5Answer to question 11:...................................................................................................5Answer to question 12:...................................................................................................5Answer to question 13:...................................................................................................6Answer to question 14:...................................................................................................6References......................................................................................................................7
Data and System Security Name of the University Author's Note_2
2DATA AND SYSTEM SECURITYAnswer to question 1:The examples of confidential information are- name, date of birth, age, sex and address, individual plans, current contact details of closed ones, reports or assignments, medical history or records, personal health and cure issues, service records and document advance notes (Hannah & Robertson, 2015). Answer to question 2:SQL Injection is "a code mixture procedure that enterprises a security shortcomingthat occurs in the database layer of a software application". SQL Injection is a championamong the most understood web hacking techniques (Shar & Tan, 2013). SQL infusion is theposition of harmful code in SQL Injections, through site page input. SQL Injections cancontrol data and deteriorate or delete tables of the database.Answer to question 3:Buffer overflow alludes to any case in which a program composes past the finish ofthe memory designated for any support including on the load, and not simply on the stack(Pang et al., 2016). For instance, while coding if any coder composes past the finish of anarray apportioned from the heap, at that point the coder has caused a buffer overflow. Answer to question 4:Organizations need to guarantee that their associations know about controls, createapproaches to fuse the necessities, and create systems to guarantee consistence with thedirections. The dangers to one’s association of noncompliance are criminal, common,statutory, administrative or authoritative punishments (Spring, 2014). The improvementand execution of authoritative security arrangements and measures will augment consistenceand limit the assets your association needs to spend to experience inward and outer
Data and System Security Name of the University Author's Note_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Study Material on Information Security and Network Architecture
|4
|1322
|186

Confidential Information Report | SQL Injection
|4
|1282
|164

Different Techniques used to deploy SQLi attacks as a way of exploiting the database and the website vulnerabilities
|18
|5031
|291

Design of System Components and User Interfaces
|15
|2493
|98