Reference no: EM133694423
Question 1. Explain what an SQL injection attack is. Make sure to explain what vulnerability an attacker is exploiting to be able to successfully conduct an SQL injection attack. What should be done to prevent injection attacks such as SQL? Speculate on what past security breaches may have been due to an SQL injection attack. Provide links to at least 1-2 articles.
Question 2. Explain several variations (at least 2-3) of statements which could be included in an input field to conduct an SQL injection attack. Make sure at least one of the statements you choose can provide all accounts for the system. Why might an attacker choose variants of the same statement?
Question 3. What query provides the version of the database? What query provides the database name?
Question 4. Suppose the goal was to query for all tables in the My_SQL database. What would be typed into the input field?
Question 5. Suppose I want to query for all column content in the Accounts table (i.e. first name, last name and password). What would be typed into the input field?
Question 6. What is a Cross Site Scripting (XSS) attack? Make sure to explain what vulnerability an attacker is exploiting to be able to successfully conduct an XSS attack. What can be done to prevent XSS attacks? Show the 2 different ways XSS could be included on a website.
Question 7. Discuss only (i.e. no screenshots): Explain how XSS can create threats such as providing cookie information to an attacker or to be used in a man-in-the-middle attack.