IITM Journal of Management and IT

  • Year: 2016
  • Volume: 7
  • Issue: 1

Securing Database using SQL Injection: A Review

  • Author:
  • Isha Shingari, Priti Sharma
  • Total Page Count: 5
  • DOI:
  • Page Number: 52 to 56

Department of Information Technology, Institute of Innovation in Technology & Management, New Delhi, India

Abstract

In one way or other we all are connected with internet. All web applications are dependent on the internet. Now a day's web applications play a vital role in everybody's life. Exponential growth could be observed in many user friendly web applications. Thousands of transactions are done daily through these applications, 80% out of which are vulnerable to malicious attacks according to the survey by the Open Web Application Security Projects (OWSAP). SQL injections is the highest security threat for web applications. SQL injection is a mechanism for inserting a malicious code in user code. Results in adding or modifying data, leak of confidential information, bypass authentication, performing denial of service, network hacking, table structure, and deleting the database. In this paper we have discussed the various aspects of SQL injection.

Keywords

Malicious code, Vulnerabilities, SQL injection, Web applications, Attack, Database component, formatting, style, styling, insert (key words)