Securing SQL servers protecting your database from attackers
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break in...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Elsevier/Syngress
2012.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629921506719 |
Tabla de Contenidos:
- ""Securing SQL Server""; ""Copyright""; ""Acknowledgements""; ""Dedication ""; ""Author Biography""; ""About the Technical Editor""; ""Table of Contents""; ""Introduction""; ""1 Securing the Network""; ""Securing the Network""; ""Network Firewalls""; ""Web Server on the Public Internet Network""; ""Web Server on the Internal Side of the Network""; ""Web Server in the Demilitarized Zone""; ""Server Firewalls""; ""Windows Firewall Inbound Rules""; ""Windows Firewall Outbound Rules""; ""Special Requirements for Clustering""; ""Direct Internet Access""
- ""Public IP Addresses versus Private IP Addresses""""Accessing SQL Server from home""; ""Physical Security""; ""Keep Your Hands Off My Box""; ""Open Network Ports""; ""Unlocked Workstations""; ""Automatically Locking Computers""; ""Social engineering""; ""Finding the Instances""; ""Testing the Network Security""; ""Summary""; ""References""; ""2 Database Encryption""; ""Database Encryption""; ""Hashing versus Encryption""; ""Triple DES""; ""RC Algorithms""; ""AES""; ""Hashing""; ""SHA2 and SQL Server""; ""Encrypting Objects""; ""Encrypting data within tables""
- ""Encrypting within Microsoft SQL Server""""Encrypting within the Application Tier""; ""Encrypting data at rest""; ""TDE and FILESTREAM""; ""Log Shipping, Database Mirroring, and Always On""; ""Key Protection""; ""Encrypting data on the wire""; ""SQL Server Over SSL""; ""SQL Server 7 and 2000""; ""SQL Server 2005 and Up""; ""Certificate Strength Differences""; ""Managing SSL Certificates""; ""Hiding the Instance""; ""IP Sec""; ""Encrypting data with MPIO drivers""; ""PowerPath Encryption with RSA Requirements and Setup""; ""Encrypting data via HBAs""; ""Summary""; ""References""
- ""3 SQL Password Security""""SQL Server Password Security""; ""Extended Protection""; ""SPNs""; ""Strong Passwords""; ""Contained Database Logins in SQL Server 2012""; ""Encrypting Client Connection Strings""; ""SQL Reporting Services""; ""Application Roles""; ""Using Windows Domain Policies to Enforce Password Length""; ""Windows Authentication Group Policies""; ""Windows Domain Requirements to Use Domain Policies to Manage SQL Authentication Logins""; ""Contained Databases""; ""Contained Databases and Auto Close""; ""db_owners Can Now Add New Users to the Instance""
- ""Password Policies and Contained Users""""Summary""; ""References""; ""4 Securing the Instance""; ""What to Install, and When?""; ""SQL Authentication and Windows Authentication""; ""Editing the master.mdf File""; ""Using a Debugger to Intercept Passwords""; ""Purchased Products""; ""Password Change Policies""; ""Auditing Failed Logins""; ""Renaming the SA Account""; ""Disabling the SA Account""; ""Securing Endpoints""; ""Stored Procedures as a Security Measure""; ""Access to Base Tables Isn�t Required""; ""Enabling Cross Database Chaining""; ""Minimum Permissions Possible""
- ""Instant File Initialization""