Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Protection
of data is essential in this rapidly evolving technological world. As many of
the users rely on the database management system for protection and storage of
the sensitive/personal data. Hackers use various methods to invade the user’s
privacy such as SQL Injection Attack, Denial of Service, Weak Authentication,
etc. There are several measures to counter these attacks such as Vulnerability
Scanners, Input Validation, Firewall and Intrusion Detection Systems, Two
Factor Authentication and Password Complexity, etc. This paper studies the
types of Database Attacks, their counter measures and proposes an approach to
defend against these attacks.
Country : India
IRJIET, Volume 7, Issue 2, February 2023 pp. 101-106