首页 | 本学科首页   官方微博 | 高级检索  
     

浅析SQL注入漏洞与防范措施
引用本文:冯昀,黎洁文. 浅析SQL注入漏洞与防范措施[J]. 广西通信技术, 2014, 0(1): 26-31
作者姓名:冯昀  黎洁文
作者单位:[1]广西区通信管理局,广西南宁530015 [2]南宁燎旺车灯有限责任公司,广西南宁530001
摘    要:在各种各样的应用系统中,由于数据库涉及到敏感数据、安全问题、防篡改与防窃取等问题,越来越引起人们关注。数据库漏洞的种类繁多是数据库系统受到攻击的主要原因,通过研究数据库的安全风险,有助于人们对数据库安全的深入理解并加以预防和避免。

关 键 词:数据库安全  安全风险  安全加固

Analysis of SQL Injection Vulnerabilities and Preventive Measures
Feng Yun,Li Jiewen. Analysis of SQL Injection Vulnerabilities and Preventive Measures[J]. Guangxi Communication Technology, 2014, 0(1): 26-31
Authors:Feng Yun  Li Jiewen
Affiliation:1.GuangxiCommunicationsAdminstration, GuangxiNanning530015,China; 2. NanningUaowangautomotivelampCo. Ltd., Guangxi Nanning 530001, China )
Abstract:In a variety of application system,because the database involve sensitive data, security, anti tampering and theft problem, which has attracted people's attention. The main reason for database system attacked is a wide variety of database vulnerability and danger of serious,studying security risk from database that can contribute to the understanding of the database security to avoid attacks.
Keywords:Database Security  Security Risk  Security Reinforcement
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号