Mile2 Cybersecurity Institute

OCU C)ISSO A Discussion Lesson 14

Viewing 5 reply threads
  • Author
    Posts
    • #99316
      Manny Varela
      Keymaster

      Database security has many issues.  After reading this chapter and viewing the video, discuss 2 issues that you have experienced or heard about.  Explain the security issue and what happened.  If you have never experienced any of these issues, choose two to explain in detail giving examples of what could happen in an organization.

    • #111673
      Carlos Martes
      Participant

      Database security is important because database store the most valuable information in an organization, such as customer records, financial data, and internal systems. One common issue is SQL injection, where an attacker sends harmful commands through a website or form. If the system is not properly protected, the attacker ca access or even delete the database. This often happens when input fields are not validated. Another major issue is weak access control., Sometimes employees are given more privileges than they need, or old accounts are never removed. This can lead to unauthorized access, accidental data exposure or insider misuse.

      • #112065
        Trae Johnson
        Participant

        I agree with you on SQL injection and poor access control being big risks. I have seen where organizations have lost their customers’ secret information due to forgotten employee accounts, which were never deleted, thus underlining the importance of managing access.

    • #111731
      Isabelle Tubbs
      Participant

      Because databases are holding a large amount of data in their system, which can potentially be really important and sensitive information, they must be kept secure from outside attacks or internal threats.
      One database issue I have heard of is SQL injecting/cross-site scripting attacks (XSS). This occurs when someone maliciously enter code on a site and allows the attacker to execute commands on the database. The system must be protected from this by using tools that check that the information that is put into the system before it is uploaded and used in the database. To do this, it is also important to test the website to make sure its protection is working correctly. In fact, a major second issue with databases is a lack of testing in general. Failing to test a database properly means there could be holes in the software, which would lead it to be vulnerable to attacks. Weaknesses in the system must be found addressed to prevent anyone else from exploiting it. This should be done early in the process, but it should also be done later by creating patches or updates to the site.

      • #111758
        Mjulius513
        Participant

        Hey Isabelle, you made some great points about why databases need strong protection. SQL injection and XSS are serious threats, and you’re right that checking all input and doing regular security testing helps stop those attacks. I also agree that not testing systems leaves big weaknesses. Keeping the database and software updated with patches is one of the best ways to prevent attackers from using those gaps.

    • #111744
      Mjulius513
      Participant

      Two common issues in database security are insufficient testing before launch and weak security. When organizations hurry to start a new system without proper testing, they often miss vulnerabilities like wrong permissions, missing updates, or unsecured access points. This can lead to users accidentally accessing data they shouldn’t or attackers easily exploiting the system. Another major problem is poor security practices, such as weak password management or bad backups, which make the database vulnerable. If a hacker accesses the system through a weak password or an unprotected account, they can corrupt, delete, or change important data, causing the database to fail and disrupting the organization’s operations. These failures can lead to downtime, financial losses, and damage to trust. Both issues show why organizations need to carefully test and improve their security measures before relying on a database in day-to-day operations.

      • #111767
        Isabelle Tubbs
        Participant

        Hi, Mjulius. You brought up a great point about insufficient testing before launching a system. It can seem tempting to push things early to move along a timeline faster, but not doing the proper testing to ensure security could end up creating greater consequences than taking more time for testing in the first place. Testing early can prevent leaving weaknesses in a security system.

      • #112064
        Trae Johnson
        Participant

        I agree that the risks of insufficient testing and insecure environments are severe. I have witnessed situations where the database had gone live without applying the necessary security patch, making it vulnerable to sql injection or hacking. Such problems could easily have been avoided through rigorous testing and sound password policies.

    • #111779
      Carlos Martes
      Participant

      Database security issues are serious because a single weakness can expose sensitive information. Common problems include weak access controls and SQL injection attacks, both of which allow unauthorized users to view or manipulate data. These failures can lead to financial loss, damaged reputation, and major disruptions for an organizations.

    • #112063
      Trae Johnson
      Participant

      Two big concerns that exist in ensuring that a database is secure that I have identified and/or learned about include SQL injection and insider threat attacks. SQL injection occurs when an attacker seeks to manipulate input fields with malicious commands that interact with a database. For instance, where a company website lacks input validation, it becomes possible for an attacker to enter commands that result in their viewing, deleting, and/or modifying privileged data such as customer and/or financial information on a website hosted by the company.

      Insider threats arise when personnel or contractors abuse their access privileges, either voluntarily or inadvertently. An employee with unnecessary access privileges could copy sensitive information to an unsecured area or accidentally delete files. Even if there are no ill Intentions, poor access control could lead to the inadvertent revelation of sensitive information. Both of these problems demonstrate the need for proper input validation, strict access control, and database activities to ensure security and safeguard vital information of the organization.

Viewing 5 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.