|
SQL Injection Attacks: Techniques and Protection MechanismsKeywords: Privacy , Security , Code Injection , SQL Injection , web application security , Malicious Code , Vulnerability. Abstract: When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.
|