Forms and Validity
SQL injection attack (SQLIA) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project. The attacking vector contains five main sub-classes depending on the technical aspects of the attack's deployment:
- Classic SQLIA
- Inference SQL injection
- Interacting with SQL injection
- Database management system-specific SQLIA
- Compounded SQLIA
- SQL injection + insufficient authentication
- SQL injection + DDoS attacks
- SQL injection + DNS hijacking
- SQL injection +XSS
A complete overview of the SQL Injection classification is presented in the next figure. The Storm Worm is one representation of Compounded SQLIA.
This classification represents the state of SQLIA, respecting its evolution until 2010—further refinement is underway.
Read more about this topic: SQL Injection
Famous quotes containing the words forms and, forms and/or validity:
“I regret the unhappiness of princes who are slaves to forms and fettered by caution.”
—Elizabeth I (15331603)
“When we speak the word life, it must be understood we are not referring to life as we know it from its surface of fact, but to that fragile, fluctuating center which forms never reach.”
—Antonin Artaud (18961948)
“There are ... two minimum conditions necessary and sufficient for the existence of a legal system. On the one hand those rules of behavior which are valid according to the systems ultimate criteria of validity must be generally obeyed, and on the other hand, its rules of recognition specifying the criteria of legal validity and its rules of change and adjudication must be effectively accepted as common public standards of official behavior by its officials.”
—H.L.A. (Herbert Lionel Adolphus)