Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Security Project

Security Project

Ratings: (0)|Views: 14|Likes:
Published by Firas Ghazi
Security Project
Security Project

More info:

Categories:Types, School Work
Published by: Firas Ghazi on Dec 26, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





The project is talking about the security thread that can be happenin the network. Much kind of tricks and ways to hack the data fromthe internet, one of them is the SQL injection. SQL injection is yetanother common vulnerability that is the result of lax inputvalidation.Unlike cross-site scripting vulnerabilities that are ultimately
directed at your site’s
visitors, SQL injection is an attack on thesite itself 
in particular its database. The goal of SQL injection is toinsert arbitrary data, most often a database query, into a string
that’s eventually executed by the database. The insidious query
may attempt any number of actions, from retrieving alternatedata, to modifying or removing information from the database.
1.2 Problem Background
As mentioned in introduction part the SQL injection is kind of 
thread that exist in computer network. SQL injection’s objective is
to retrieve the information that available in certain networks. Thehackers, the users will try to expose the information and use it fortheir own purpose. The existing problem so far is:1.
The data can be misuse by the hackers2.
Privacy can be no longer be belong to the first owner
1.3 Objective
To study the existing methods used by others to disseminateinformation from the internet.
To run a program that can be used for SQL injectionmethods.
To evaluate the existing program that available in internet.
1.4 Project Aims
The aims of this project are that could be used by the student orusers to get the information and learn to understand how the SQlInjection works and can be a threat to the network.
1.5 Scope
The scope will be the website that running in internet.
In this chapter, it will be chapter that discuss about the things thatrelated to the field of project. Knowing the information and howapplication will be function is very important.Literature review consists of the research aspect on the features,theories and the limitations that can be found, and it will be usedas compass in application development process later on. All theinformation which is considered important will be collected andafter that doing study on the existing application, so it can providea better picture as well as getting more ideas how it works.
2.2 Introduction to Databases
A database is a structured collection of data. The data are typicallyorganized to model relevant aspects of reality (for example, theavailability of rooms in hotels), in a way that supports processesrequiring this information (for example, finding a hotel withvacancies).The term database is correctly applied to the data and theirsupporting data structures, and not to the database managementsystem (DBMS). The database data collection with DBMS is called adatabase system.The term database system implies that the data are managed tosome level of quality (measured in terms of accuracy, availability,usability, and resilience) and this in turn often implies the use of ageneral-purpose database management system (DBMS). A

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->