Database protection in Web applications
Вантажиться...
Дата
Назва журналу
Номер ISSN
Назва тому
Видавець
II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem
Анотація
Abstract. Web applications are widely used in business, science, and everyday life. The main element that
ensures the storage and processing of information is the database (DB). However, the database is
often the weakest link in the structure of information systems. Attackers use various methods that can
lead to data leakage, forgery, or destruction. Therefore, ensuring the security of databases in web
applications is of critical importance.
Main Threats to Database Security
SQL Injections. This is one of the most common attacks, in which an attacker inserts specially
crafted SQL code into a form or URL that is then executed by the database. As a result, the attacker
may gain unauthorized access, modify, or delete data.
XSS (Cross-Site Scripting). In this case, a malicious JavaScript script is embedded into a web
page. When a user opens the page, the script executes in their browser, which can lead to the theft of
cookies, passwords, or session data.
DoS/DDoS Attacks. These attacks aim to overload the server with a large number of requests.
In the case of DDoS, requests come simultaneously from many devices, making the web application
and its database inaccessible to legitimate users.
Unauthorized Access. Attackers often try to guess or steal administrator and user passwords.
Weak passwords and the absence of multi-factor authentication significantly increase the risk of
system compromise.
Data Leakage. Misconfigured servers or lack of encryption during data transmission (for
instance, absence of HTTPS) can result in sensitive information being intercepted.
Methods for Database Protection
Parameterized Queries. The use of prepared statements instead of dynamically generated SQL
queries effectively prevents SQL injections.
Validation and Filtering of Input Data. Checking the format, length, and data type helps reduce
the risk of injecting malicious code.
Protection Against XSS. Implemented through HTML character escaping, Content Security
Policy (CSP), and input sanitization.
Access Control. Applying the principle of least privilege and multi-factor authentication
protects the system from both internal and external threats.
Encryption. Employing TLS/SSL for data transmission and storing passwords in a hashed and
salted form enhances data confidentiality.
Опис
Teljes kiadvány: https://kme.org.ua/uk/publications/rol-bezpeki-v-transkordonnomu-ta-mizhnarodnomu-spivrobitnictvi/
Ключові слова
Бібліографічний опис
In Csernicskó István, Maruszinec Marianna, Molnár D. Erzsébet, Mulesza Okszána és Melehánics Anna (szerk.): A biztonság szerepe a határon átnyúló és nemzetközi együttműködésben. Nemzetközi tudományos és szakmai konferencia Beregszász, 2025. október 8–9. Absztraktkötet. Beregszász, II. Rákóczi Ferenc Kárpátaljai Magyar Egyetem, 2025. pp. 106-107.
Endorsement
Review
Supplemented By
Referenced By
Creative Commons license
Except where otherwised noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States
