How Hackers Attack SQL Server
This final section of the chapter starts with a disclaimer: We do not cover every possible way that hackers can attempt to compromise SQL Server. Rather, we introduce the various methods of exploitation and try to get you thinking about security up front when you design database applications and configure your system. Let’s start the discussion with topics related to how SQL Server is configured.
Direct Connection to the Internet
Exposing any operating system or application directly to the Internet without the use of a firewall is a bad thing—no matter whether you are using Linux, UNIX, Windows, or any other operating system. It’s rather like the carnival game where someone sits on a platform above a pool of water waiting ...
Get Programming Microsoft® SQL Server® 2012 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.