Mile2 Cybersecurity Certifications

Cybersecurity Certifications

OCU C)ISSO C Discussion Lesson 14

Viewing 3 reply threads
  • Author
    Posts
    • #93555
      Manny Varela
      Keymaster

      Database security has many issues.  After reading this chapter and viewing the video, discuss 2 issues that you have experienced or heard about.  Explain the security issue and what happened.  If you have never experienced any of these issues, choose two to explain in detail giving examples of what could happen in an organization.

    • #106499
      Amy Hastings
      Participant

      Some databased issues that I have encountered or heard about from others would be things like when you go onto certain websites, sometimes they want you to fill out personal information like your email, phone number, or sometimes you address or credit card information just to use the site. This is a major security issue, and you should never use websites that ask things like that unless you know for certain it is a real site. This has happened to me as well as family members and some of them have filled it out then started getting fake emails from people. This is dangerous to do because that site can save your information even if you delete it and this can lead to you getting hacked or something worse. Another that I experienced and still do from time to time would be I get fake emails and text messages saying things like “your package cannot be delivered due to insufficient information”, and they would want me to put my address in it, I don’t know why or what it is for exactly but I am a very cautious person with things like that so I never do it but if someone were to their personal information could be stolen. I also one time was out of town, and someone took three hundred dollars out of my account, and no one could figure out why and my brother had the same thing happen same amount and everything. This is the only thing that I ever had happen bad.

      • #106534
        Ashly Jackson
        Participant

        Many people face database security issues, such as websites requesting personal info like emails, phone numbers, addresses, or credit card details before use. This can be risky if the site isn’t legitimate, potentially leading to data theft or hacking. Fake emails or texts pretending to need delivery info are common tricks to steal information. Being cautious helps, but sometimes financial fraud still happens, like unauthorized withdrawals from bank accounts. These experiences highlight the importance of verifying websites and messages before sharing sensitive data to protect personal and financial security.

    • #106507
      Ashly Jackson
      Participant

      Database security faces several critical challenges that can impact organizations severely. Two common issues are unauthorized access and SQL injection attacks.

      Unauthorized access occurs when individuals gain entry into a database without proper permissions. For example, an employee might use another person’s login credentials to view confidential information. This breach can lead to sensitive data exposure, loss of customer trust, and potential legal consequences for the organization.

      SQL injection is a technique where attackers manipulate query inputs to execute malicious commands within a database. For instance, if an application fails to validate user inputs properly, an attacker can insert harmful SQL code to retrieve or alter data unlawfully. This can result in data theft, corruption, or even complete system compromise, severely disrupting the organization’s operations.

      Both issues highlight the necessity for robust security measures like strong authentication protocols, input validation, and regular security audits to protect organizational data integrity and confidentiality. Failure to address these vulnerabilities can expose organizations to financial loss and reputational damage.

    • #106547
      Joseph Doss
      Participant

      Some database security issues can simply be misconfigurations, an open port that could allow attackers access, poor admin passwords, or incomplete/lazy programming that could lead to an SQL injection, as demonstrated in this video https://www.youtube.com/watch?v=2OPVViV-GQk

Viewing 3 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.