OCU C)ISSO C Discussion Lesson 14
- This topic has 4 replies, 7 voices, and was last updated 2 months, 1 week ago by
Joseph Doss.
-
AuthorPosts
-
-
February 15, 2024 at 4:05 pm #93555
Manny Varela
KeymasterDatabase security has many issues. After reading this chapter and viewing the video, discuss 2 issues that you have experienced or heard about. Explain the security issue and what happened. If you have never experienced any of these issues, choose two to explain in detail giving examples of what could happen in an organization.
-
June 9, 2025 at 8:42 pm #106499
Amy Hastings
ParticipantSome databased issues that I have encountered or heard about from others would be things like when you go onto certain websites, sometimes they want you to fill out personal information like your email, phone number, or sometimes you address or credit card information just to use the site. This is a major security issue, and you should never use websites that ask things like that unless you know for certain it is a real site. This has happened to me as well as family members and some of them have filled it out then started getting fake emails from people. This is dangerous to do because that site can save your information even if you delete it and this can lead to you getting hacked or something worse. Another that I experienced and still do from time to time would be I get fake emails and text messages saying things like “your package cannot be delivered due to insufficient information”, and they would want me to put my address in it, I don’t know why or what it is for exactly but I am a very cautious person with things like that so I never do it but if someone were to their personal information could be stolen. I also one time was out of town, and someone took three hundred dollars out of my account, and no one could figure out why and my brother had the same thing happen same amount and everything. This is the only thing that I ever had happen bad.
-
June 12, 2025 at 11:36 am #106534
Ashly Jackson
ParticipantMany people face database security issues, such as websites requesting personal info like emails, phone numbers, addresses, or credit card details before use. This can be risky if the site isn’t legitimate, potentially leading to data theft or hacking. Fake emails or texts pretending to need delivery info are common tricks to steal information. Being cautious helps, but sometimes financial fraud still happens, like unauthorized withdrawals from bank accounts. These experiences highlight the importance of verifying websites and messages before sharing sensitive data to protect personal and financial security.
-
-
June 10, 2025 at 11:30 am #106507
Ashly Jackson
ParticipantDatabase security faces several critical challenges that can impact organizations severely. Two common issues are unauthorized access and SQL injection attacks.
Unauthorized access occurs when individuals gain entry into a database without proper permissions. For example, an employee might use another person’s login credentials to view confidential information. This breach can lead to sensitive data exposure, loss of customer trust, and potential legal consequences for the organization.
SQL injection is a technique where attackers manipulate query inputs to execute malicious commands within a database. For instance, if an application fails to validate user inputs properly, an attacker can insert harmful SQL code to retrieve or alter data unlawfully. This can result in data theft, corruption, or even complete system compromise, severely disrupting the organization’s operations.
Both issues highlight the necessity for robust security measures like strong authentication protocols, input validation, and regular security audits to protect organizational data integrity and confidentiality. Failure to address these vulnerabilities can expose organizations to financial loss and reputational damage.
-
June 14, 2025 at 6:17 pm #106547
Joseph Doss
ParticipantSome database security issues can simply be misconfigurations, an open port that could allow attackers access, poor admin passwords, or incomplete/lazy programming that could lead to an SQL injection, as demonstrated in this video https://www.youtube.com/watch?v=2OPVViV-GQk
-
-
AuthorPosts
- You must be logged in to reply to this topic.