What does a SQL injection do
sends malicious SQL commands to the db server
What is the most common attack goal of a SQL injection
bulk extraction of data
How does an SQLi attack typically work

What is an inferential attack

3 main ways to countermeasure sql injections
defensive coding
detection
run time prevention
how is run time prevention of sqli done

what is centralized administration

what is ownership based administration

What is decentralized administration

what are the 3 SQL commands for managing access rights
Grant, Revoke
What are the 3 catrgories of database users

how does the the following work


how does the the following work


what are the main disadvantages of db encryption
