Abstract
Database systems and the data they contain, are one of the most important elements of the modern world of computer science. Nowadays, threat greatly increases for the safe storage of data. The purpose of this article is to classify and analyze the selected types of attacks on the database management system. At the beginning selected attacks on the DBMS are classified and described. Afterwards, exemplary attacks were carried out in the test environment. The attacks on the DBMS includes: DDoS attacks, inference, social engineering, penetration test, packet sniffing and attacks using vulnerabilities in programs like SQL Injection.
References
[1] Graves K.: CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50, Sybex, pp. 1-16, 2007.
[2] Kulkarni S., Urolagin S.: Review of Attacks on Databases and Database SecurityTechniques. International Journal of Emerging Technology and Advanced Engineering, vol. 2, Issue 11, pp. 253-263, 2012.
[3] Ben-Natan R.: HOWTO Secure and Audit Oracle 10g and 11g, Auerbach Publications, s. 29-189, 2009.
[4] Mitnick K., Simon W.: Sztuka podstępu. Łamałem ludzi, nie hasła, Helion, 2003.
[5] Muniz J., Lakhani A.: Kali Linux Testy penetracyjne, Helion, 2014.
[6] Clarke J.: SQL Injection Attacks and Defense, Syngress Publishing, 2009.
[2] Kulkarni S., Urolagin S.: Review of Attacks on Databases and Database SecurityTechniques. International Journal of Emerging Technology and Advanced Engineering, vol. 2, Issue 11, pp. 253-263, 2012.
[3] Ben-Natan R.: HOWTO Secure and Audit Oracle 10g and 11g, Auerbach Publications, s. 29-189, 2009.
[4] Mitnick K., Simon W.: Sztuka podstępu. Łamałem ludzi, nie hasła, Helion, 2003.
[5] Muniz J., Lakhani A.: Kali Linux Testy penetracyjne, Helion, 2014.
[6] Clarke J.: SQL Injection Attacks and Defense, Syngress Publishing, 2009.