①Default, Blank & Weak
Username/Password
②SQL Injection in the DBMS
③Excessive User & Group
Privilege
④Unnecessary Enabled
Database Features
⑤Broken Configuration
Management
⑥Buffer Overflows
⑦Privilege Escalation
⑧Denial of Service Attack DoS
⑨Un-patched Databases
'IT 와 Social 이야기' 카테고리의 다른 글
[Download] OWASP Cloud Top10 Risks (0) | 2012.04.24 |
---|---|
[Slide] OWASP Mobile Top 10 Risks (0) | 2012.04.24 |
[Video News] Will this open-source animated film change the movie industry forever? (0) | 2012.04.21 |
Why Encryption is Not Enough to Secure Your Data (0) | 2012.04.12 |
[Jer Thorp] The Weight of Data (0) | 2012.03.07 |