Talk:SQL injection: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: {{subpages}})
 
imported>Howard C. Berkowitz
No edit summary
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{subpages}}
{{subpages}}
== Department of Energy report including risk ==
While I didn't want to modify an Eduzendium page, I thought I'd note a report that became available today, [http://www.fas.org/sgp/eprint/nstb.pdf].  This is a  report on the vulnerability of critical control infrastructure, and discusses the danger of SQL injection to the historian server, often shared between a critical control network and a corporate network. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 15:51, 2 August 2010 (UTC)

Latest revision as of 09:59, 2 August 2010

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition An attack vector that is used to malicious alter database interactions in computer applications. [d] [e]
Checklist and Archives
 Workgroup category Computers [Please add or review categories]
 Talk Archive none  English language variant American English

Department of Energy report including risk

While I didn't want to modify an Eduzendium page, I thought I'd note a report that became available today, [1]. This is a report on the vulnerability of critical control infrastructure, and discusses the danger of SQL injection to the historian server, often shared between a critical control network and a corporate network. Howard C. Berkowitz 15:51, 2 August 2010 (UTC)