You are on page 1of 3

Study on SQL Injection attacks And its Prevention

SQL injection is a web security vulnerability used by attackers to gain the


access and bypass the security measures to gain users database.
It’s the process by which attackers insert the malicious SQL codes into the
queries and spoils the DB and have access to protected resources such as
sensitive data or private credentials etc.

FACT -- SQL injection was first discovered in 1998 but still it’s among the TOP 10 OWASP
vulnerability List (OWASP – Open Web Application Security Project)

Source - indusface.com

1. Hackers use your input fields to inject malicious codes.

2. The server executes the code received from the browser.

3. Once a hacker gains control, he can steal, edit, delete sensitive data or exploit other
admin rights

Different ways to prevent SQL attacks:


 Continuous Scanning and penetration Testing
 Use of query parameters
 Restrict Privileges
 Instant protection
 Many More……………
Planning and Details for SET Research work

Team –
 SANKET KUMAR (22MCA0143)
 MOHIT KUMAR (22MCA0170)
 ABHILASH DUTTA (22MCA0210)

Prerequisite –
 Study of the Top Research papers and the Review
papers on the SQL injections and its prevention
techniques.

Tentative Content –
 Study about DBMS and SQL language
 Brief Note on SQL injections, its types and its Attacks
 A Case Study example
 Its effect on Organisations and its users
 Its effect in the field of cyber security and projects
 Brief study on the different ways to foil SQL injections
 New ways to tackle the injection Attacks

You might also like