View Post

SQL Injection Explained

In Cybersecurity, Web Development by Ian0 Comments

This entry is part 7 of 8 in the series Prevention and Protection Strategies

This entry is part 7 of 8 in the series Prevention and Protection StrategiesSQL injection has been a method of attacking databases through multiple tiers of application infrastructure for many years, MacVittie (2008).  SQL or Sequential Query Language is a database language used to interact with large quantities of data, typically stored in tables inside a Relational Database Management System …

Share
View Post

Usable Security? User Friendly Factors

In Cybersecurity by Ian0 Comments

This entry is part 6 of 8 in the series Prevention and Protection Strategies

This entry is part 6 of 8 in the series Prevention and Protection StrategiesIn his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within the organization. He makes the case that security has to be simple and at the same time it has to minimize hassle (for …

Share
View Post

Post Authentication Methods

In Cybersecurity by Ian0 Comments

This entry is part 5 of 8 in the series Prevention and Protection Strategies

This entry is part 5 of 8 in the series Prevention and Protection StrategiesA lot of time can be spent in an organization firming up authentication and access control systems to ensure greater levels of security to their network. All of this however is only one step to insuring a users credentials are not compromised. Considerations need to be made …

Share