WENDY LEWIS ONLY

"SQL Injection Attacks and Preventions" Select ONE of the following bullets and discuss in no less than three paragraphs:

  • Read Sammut, T., & Schiffman, M. (2013, April 5). Understanding SQL Injection. Retrieved from http://www.cisco.com/web/about/security/intelligence/sql_injection.html. 
    Read Wichers, D., Manico, J., & Seil, M. (2014, April 12). SQL Injection Prevention Cheat Sheet. Retrieved from https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet.
    Describe the major concerns that information security professionals and SQL database administrators should have with SQL injection attacks. Additionally, provide the key reasons why you believe such attacks are popular among hackers, both malicious and ethical. Justify your response.

  • Suggest what you believe to be the two most critical best practices for protecting against SQL injection attacks, and establish whether or not you believe that there are significant efforts for security professionals who implement these best practices. Provide a rationale for your response.

  • Any current topic or article related to penetration techniques.

  • The instructor insight.

**Please use APA format and cite all resources in APA format. Times New Roman, 12 Font.