Меню
No. 3 (24) - 2024 / 2024-09-30 / Number of views: 76
Authors
Keywords
Link to DOI:
How to quote
Currently, web technologies are used everywhere in online stores, banks, and enterprise web pages. At the same time, databases are often used to write web applications. The database is characterized by information security threats. During the authentication process, an attacker can use an information attack such as SQL Injection to gain access to data. The essence of this attack is to exploit an error at the intersection of web technologies and SQL. This is due to the fact that many web pages form a special SQL query to databases to process user data, which can lead to the introduction of malicious code.
The article discusses the main threats and vulnerability of web application databases from SQL injections. The work includes an analysis of the main types of SQL injections, methods for detecting and preventing vulnerabilities, as well as approaches to testing web application vulnerabilities. The main focus is on methods for protecting databases from SQL injections and developing practical recommendations for ensuring the security of web applications.
The topic of the research is relevant in the modern world, since the Internet has become an integral part of our lives. As the use of apps has increased, the need for security measures to protect sensitive data has also increased. Web application vulnerabilities can lead to security breaches that can result in the loss of users' personal and financial information, damage to organizations' reputations, and legal consequences.