Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/42518
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLow, Kok Jun.-
dc.date.accessioned2010-12-30T01:47:46Z-
dc.date.available2010-12-30T01:47:46Z-
dc.date.copyright2010en_US
dc.date.issued2010-
dc.identifier.urihttp://hdl.handle.net/10356/42518-
dc.description.abstractSQL injection attacks pose a serious security threat to Web applications. They allow hackers to obtain unrestricted access to databases underlying the applications and to the potentially sensitive information these database contain. Although researchers have proposed various methods to address the SQL injection problem, but failed to address the full scope of the problem as the method can only solve a subset of the wide range of SQL injection techniques that can be exploited by hackers. To address this problem, this report presents an extensive review of the different types of SQL injection attacks known to date. In this report, description and example of one presented to illustrate how attacks could be exploited and detected. Prevention techniques against various SQL injection attacks are also discussed.en_US
dc.format.extent56 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University-
dc.subjectDRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systemsen_US
dc.titleCase study on SQL injection security attacken_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorTan Hee Beng Kuanen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
item.fulltextWith Fulltext-
item.grantfulltextrestricted-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
ea3174-092.pdf
  Restricted Access
3.22 MBAdobe PDFView/Open

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.