11.07.2015 Views

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Page 24• SQL Server Security Modelo SQL Server Security Model: Login• Creating an SQL Server Login• Database User• Guest User• Permissions• Database Engine Permissions Hierarchy• Roleso Public Roleo Predefined Roles• Fixed Server Roles• Fixed Database Roles• User-Defined Roles• Application roles• Security Features of MS-SQL Server 2005• Added Security Features in MS-SQL Server 2008• SQL Server Security Vulnerabilities:o Buffer Overflow in pwdencrypt()o Extended Stored Procedures Contain Buffer Overflows• SQL Injection Attacks• Prevent SQL Injection Attacks• Sqlninja:o SQL Server Injection & Takeover Toolo Finding Target• Data Encryption• Built-in Encryption Capabilities• Encryption Keys• Encryption Hierarchyhttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!