This chapter introduces you to the threat of database attacks. It uses real-world examples to point out reasons why attackers were successful. We’re not presenting the examples to highlight security flaws of the victimized organizations. Instead, we use these examples to illustrate the common weak points of many organizations. These examples should provide you with facts that let you identify security weaknesses and fix them.
This chapter explains why you need effective database security measures. It also helps you gain senior management support for improved measures. This chapter also lays a foundation for technical ...