© Peter A. Carter 2018
Peter A. CarterSecuring SQL Serverhttps://doi.org/10.1007/978-1-4842-4161-5_13

13. Code Injection

Peter A. Carter1 
(1)
London, UK
 

In this chapter, you will understand what is meant by code injection and how DBAs can protect against it. Finally, there will be a discussion around code signing.

Understanding Code Injection

You should think of code injection as being a corporate equivalent to a Trojan Horse virus . Seemingly innocent code is deployed, but the code contains a back door through which individuals without authorization can elevate their privileges. Code injection should not be confused with SQL injection, which is a very different type of attack.

Code injection differs from most type of attacks in the respect that it ...

Get Securing SQL Server: DBAs Defending the Database now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.