EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Page 24• SQL Server Security Modelo SQL Server Security Model: Login• Creating an SQL Server Login• Database User• Guest User• Permissions• Database Engine Permissions Hierarchy• Roleso Public Roleo Predefined Roles• Fixed Server Roles• Fixed Database Roles• User-Defined Roles• Application roles• Security Features of MS-SQL Server 2005• Added Security Features in MS-SQL Server 2008• SQL Server Security Vulnerabilities:o Buffer Overflow in pwdencrypt()o Extended Stored Procedures Contain Buffer Overflows• SQL Injection Attacks• Prevent SQL Injection Attacks• Sqlninja:o SQL Server Injection & Takeover Toolo Finding Target• Data Encryption• Built-in Encryption Capabilities• Encryption Keys• Encryption Hierarchyhttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>