SlideShare a Scribd company logo
Database Threats
Information System Security
Presented by:
Abdul Majeed Al-Kattan
Rabee Al-Rass
Rahaf Aamer
Rimon Koroni
Sandra Sukarieh
The Content
• Sensitive Data Exposure.
• Security Misconfiguration.
• SQL Injection (Blind)
• Insecure Direct Object Reference
• Cross Site Scripting
• Denial of Service
Information System Security 2
Sensitive Data Exposure
Information System Security 3
Security Misconfiguration
Information System Security 4
SQL Injection
• Can be achieved when sending unreliable data to the
interpreter as a part of a command or a query.
• Malicious data of the attacker can fool the interpreter
to:
1. Execute banned orders.
2. Access data without authority .
3. Harm the content of the database.
Information System Security 5
SQL Injection
Information System Security 6
SQL Injection Prevention
• Escape String :
1. mysqli_real_escape_string()
2. Addslashes()
• Example:
x’ or ‘x’=‘x’ –
When mysqli_real_escape_string is applied
x’ or ’x’=’x’ --
Information System Security 7
Insecure Direct Object Reference
• The insecure gap of direct object reference comes up
when the programmer expose the references to
internal components such as files, folders, or
database keys.
• Without access control tools and other methods of
protection, the hacker can manipulate these
references to reach the data without proper authority.
Information System Security 8
Insecure Direct Object Reference
Information System Security 9
Insecure Direct Object Reference Prevention
• Never expose application or database internal details
to public.
• Hide system objects with ambiguous names and do
encryption to values.
• Use sessions instead of cookies alone.
Information System Security 10
Cross Site Scripting
• Programming gaps appear across the site when the
application receives non reliable data and sends it to
the browser without checking or overcoming
(escaping).
• Programming gaps across the site allow the attacker
to implement “scripts” in the browser of the victim,
which may lead to:
1. The theft of the user’s session.
2. Distortion of the website.
3. Redirect the user to other malicious sites.
Information System Security 11
Cross Site Scripting
Information System Security 12
Cross Site Scripting Prevention
• Contextual Encoding:
1. HTML Encoding.
2. JavaScript Encoding.
3. CSS Encoding.
Information System Security 13
Denial Of Service
• One of the methods used to inundate the special
service of the database or the application with a
stream of requests, leading to deprive the real users
from the service.
• This attack can be achieved with the tool
slowhttptest.
Information System Security 14
Denial Of Service
Information System Security 15
Denial of Service Prevention
• Firewall.
• Cloud Mitigation Provider DDoS attack Detection and
Monitoring.
• Flow-Based Monitoring (PLXfbm) .
• service monitors netflow on your router.
Information System Security 16
Thank You.

More Related Content

PDF
Top 10 Database Threats
PPTX
Cybersecurity Training
PPTX
INFORMATION SECURITY SYSTEM
PDF
Ethical hacking and social engineering
PPTX
Security and management
PDF
Chapter 4 vulnerability threat and attack
PDF
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
PPTX
Cyber security
Top 10 Database Threats
Cybersecurity Training
INFORMATION SECURITY SYSTEM
Ethical hacking and social engineering
Security and management
Chapter 4 vulnerability threat and attack
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Cyber security

What's hot (20)

PPT
Iss lecture 1
PPTX
Operational Security Intelligence
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PPTX
InformationSecurity
PPTX
презентация1
PPTX
Topic11
PPT
Information security
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PPTX
Introduction to information security
PPT
Introduction To Information Security
PPTX
Hyphenet Security Awareness Training
PDF
Chapter 15 incident handling
PPT
Information security and Attacks
PDF
Security Solution - IBM Business Connect Qatar Defend your company against cy...
PDF
Preventing Data Breaches
PPTX
Information Security Basics for Businesses and Individuals
PPTX
Insider Threat Solution from GTRI
PPTX
2021 Nonprofit Cybersecurity Incident Report
PDF
Overview of Information Security & Privacy
PPTX
Career Guidance on Cybersecurity by Mohammed Adam
Iss lecture 1
Operational Security Intelligence
VAPT - Vulnerability Assessment & Penetration Testing
InformationSecurity
презентация1
Topic11
Information security
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Introduction to information security
Introduction To Information Security
Hyphenet Security Awareness Training
Chapter 15 incident handling
Information security and Attacks
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Preventing Data Breaches
Information Security Basics for Businesses and Individuals
Insider Threat Solution from GTRI
2021 Nonprofit Cybersecurity Incident Report
Overview of Information Security & Privacy
Career Guidance on Cybersecurity by Mohammed Adam
Ad

Viewers also liked (20)

DOC
System Security Threats and Risks)
PPT
Management information system
PPTX
Management information system unit v
PPTX
Mis case studies
PPTX
Management Information System
PPT
MIS Case Study Geneva Pharma
PPTX
PPTX
Management information system (MIS)
PPT
Chapter 4 Mis Case Study Mumbai Dabbawalas
PPTX
Threats to information security
PPS
Management Information System
PPTX
Security threats
PPT
Management information system
PPTX
Case study domino's sizzles on MIS
PPT
Mis lecture ppt
PPTX
Mis of hero honda
PPTX
MIS Case Study
PPTX
MIS in walmart
PPTX
Management Information Systems (MIS)
PPTX
MIS in Walmart
System Security Threats and Risks)
Management information system
Management information system unit v
Mis case studies
Management Information System
MIS Case Study Geneva Pharma
Management information system (MIS)
Chapter 4 Mis Case Study Mumbai Dabbawalas
Threats to information security
Management Information System
Security threats
Management information system
Case study domino's sizzles on MIS
Mis lecture ppt
Mis of hero honda
MIS Case Study
MIS in walmart
Management Information Systems (MIS)
MIS in Walmart
Ad

Similar to Database Threats - Information System Security (20)

PDF
Lecture 15-16.pdf
PDF
Web Security
PDF
How to Destroy a Database
PPT
Security communication
PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
PPTX
Secure Software Engineering
PDF
Security vulnerabilities related to web-based data
PPTX
WEB APPLICATION SECURITY
PPTX
Web application security part 01
PPTX
We are all info sec
PPTX
Web Application Security Session for Web Developers
PDF
The literature and write report on information system security part 1 of 5 p...
PPTX
Software security
PDF
IBWAS 2010: Web Security From an Auditor's Standpoint
PDF
Luis Grangeia IBWAS
PDF
IS L07 - Security, Ethics and Privacy
PDF
Crash Course In Brain Surgery
PPTX
cryptography .pptx
PPTX
Information Security: We are all InfoSec (updated for 2018)
Lecture 15-16.pdf
Web Security
How to Destroy a Database
Security communication
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Secure Software Engineering
Security vulnerabilities related to web-based data
WEB APPLICATION SECURITY
Web application security part 01
We are all info sec
Web Application Security Session for Web Developers
The literature and write report on information system security part 1 of 5 p...
Software security
IBWAS 2010: Web Security From an Auditor's Standpoint
Luis Grangeia IBWAS
IS L07 - Security, Ethics and Privacy
Crash Course In Brain Surgery
cryptography .pptx
Information Security: We are all InfoSec (updated for 2018)

More from sandra sukarieh (9)

PPTX
SPRAP - Master Thesis Defense
PPTX
Master Thesis Seminar
PPTX
Schema learning
PPTX
Strong stubborn sets
PPTX
Cloud Computing Interoperability in Education
PPTX
Applications of Distributed Systems
PPTX
Storyboarding - Information Systems Engineering
PPTX
Timed Colored Perti Nets
PPTX
Web Server - Internet Applications
SPRAP - Master Thesis Defense
Master Thesis Seminar
Schema learning
Strong stubborn sets
Cloud Computing Interoperability in Education
Applications of Distributed Systems
Storyboarding - Information Systems Engineering
Timed Colored Perti Nets
Web Server - Internet Applications

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPT
Teaching material agriculture food technology
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Modernizing your data center with Dell and AMD
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
KodekX | Application Modernization Development
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Teaching material agriculture food technology
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Monthly Chronicles - July 2025
Modernizing your data center with Dell and AMD
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced Soft Computing BINUS July 2025.pdf
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation

Database Threats - Information System Security

  • 1. Database Threats Information System Security Presented by: Abdul Majeed Al-Kattan Rabee Al-Rass Rahaf Aamer Rimon Koroni Sandra Sukarieh
  • 2. The Content • Sensitive Data Exposure. • Security Misconfiguration. • SQL Injection (Blind) • Insecure Direct Object Reference • Cross Site Scripting • Denial of Service Information System Security 2
  • 5. SQL Injection • Can be achieved when sending unreliable data to the interpreter as a part of a command or a query. • Malicious data of the attacker can fool the interpreter to: 1. Execute banned orders. 2. Access data without authority . 3. Harm the content of the database. Information System Security 5
  • 7. SQL Injection Prevention • Escape String : 1. mysqli_real_escape_string() 2. Addslashes() • Example: x’ or ‘x’=‘x’ – When mysqli_real_escape_string is applied x’ or ’x’=’x’ -- Information System Security 7
  • 8. Insecure Direct Object Reference • The insecure gap of direct object reference comes up when the programmer expose the references to internal components such as files, folders, or database keys. • Without access control tools and other methods of protection, the hacker can manipulate these references to reach the data without proper authority. Information System Security 8
  • 9. Insecure Direct Object Reference Information System Security 9
  • 10. Insecure Direct Object Reference Prevention • Never expose application or database internal details to public. • Hide system objects with ambiguous names and do encryption to values. • Use sessions instead of cookies alone. Information System Security 10
  • 11. Cross Site Scripting • Programming gaps appear across the site when the application receives non reliable data and sends it to the browser without checking or overcoming (escaping). • Programming gaps across the site allow the attacker to implement “scripts” in the browser of the victim, which may lead to: 1. The theft of the user’s session. 2. Distortion of the website. 3. Redirect the user to other malicious sites. Information System Security 11
  • 12. Cross Site Scripting Information System Security 12
  • 13. Cross Site Scripting Prevention • Contextual Encoding: 1. HTML Encoding. 2. JavaScript Encoding. 3. CSS Encoding. Information System Security 13
  • 14. Denial Of Service • One of the methods used to inundate the special service of the database or the application with a stream of requests, leading to deprive the real users from the service. • This attack can be achieved with the tool slowhttptest. Information System Security 14
  • 15. Denial Of Service Information System Security 15
  • 16. Denial of Service Prevention • Firewall. • Cloud Mitigation Provider DDoS attack Detection and Monitoring. • Flow-Based Monitoring (PLXfbm) . • service monitors netflow on your router. Information System Security 16