14. FAMOUS METHOD
“Way of attempting to acquire sensitive information such as
usernames, passwords and credit card details by masquerading as
a trustworthy entity in an electronic communication.”
22. ENCRYPTION
Encryption is the process of transforming information (referred to
as plaintext) using an algorithm(called cipher) to make it unreadable to
23. STEGANOGRAPHY
“Hiding data inside a image file or any graphic
file.”
24. HONEYPOT SYSTEM
“It is a trap set to detect unauthorized users”
25. PASSWORD PROTECTION
“Treat your password like your toothbrush. Don't let anybody else use
it, and get a new one every one month.”
28. REFRENCES
Books:
Network security principles and practices by Saadat Malik
Network security: the complete reference by Roberta
Bragg
Network Security Hacks by Andrew Lockhart
Hacking exposed 6 by Stuart Mc Curle
Links :
http://www.networkworld.com/topics/security.html
http://isc.sans.org/
http://www.interhack.net/pubs/network-security/
http://www.networksecurityjournal.com/
http://www.esecurityplanet.com/views/
31. EXAMPLE
This SQL code is designed to pull up the records of the specified
username from its table of users:
statement = "SELECT * FROM `users` WHERE `name` = '" + userName + "';“
For example, setting the "userName" variable as:
' or '1'='1
Renders this SQL statement by the parent language:
SELECT * FROM `users` WHERE `name` = '' OR '1'='1';
True always