How Hackers Attack SQL Server
This final section of the chapter starts with a disclaimer: We do not cover every possible way that hackers can attempt to compromise SQL Server. Rather, we introduce the various methods of exploitation and try to get you thinking about security up front when you design database applications and configure your system. Let’s start the discussion with topics related to how SQL Server is configured.
Direct Connection to the Internet
Exposing any operating system or application directly to the Internet without the use of a firewall is a bad thing—no matter whether you are using Linux, UNIX, Windows, or any other operating system. It’s rather like the carnival game where someone sits on a platform above a pool of water waiting ...