Forms and Validity
SQL injection attack (SQLIA) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project. The attacking vector contains five main sub-classes depending on the technical aspects of the attack's deployment:
- Classic SQLIA
- Inference SQL injection
- Interacting with SQL injection
- Database management system-specific SQLIA
- Compounded SQLIA
- SQL injection + insufficient authentication
- SQL injection + DDoS attacks
- SQL injection + DNS hijacking
- SQL injection +XSS
A complete overview of the SQL Injection classification is presented in the next figure. The Storm Worm is one representation of Compounded SQLIA.
This classification represents the state of SQLIA, respecting its evolution until 2010—further refinement is underway.
Read more about this topic: SQL Injection
Famous quotes containing the words forms and/or validity:
“All ... forms of consensus about great books and perennial problems, once stabilized, tend to deteriorate eventually into something philistine. The real life of the mind is always at the frontiers of what is already known. Those great books dont only need custodians and transmitters. To stay alive, they also need adversaries. The most interesting ideas are heresies.”
—Susan Sontag (b. 1933)
“There are ... two minimum conditions necessary and sufficient for the existence of a legal system. On the one hand those rules of behavior which are valid according to the systems ultimate criteria of validity must be generally obeyed, and on the other hand, its rules of recognition specifying the criteria of legal validity and its rules of change and adjudication must be effectively accepted as common public standards of official behavior by its officials.”
—H.L.A. (Herbert Lionel Adolphus)