What is Big Data and why it is distinct from average sized DataWhat NoSQL Actually isWhy the issue of NoSQL Security should be important to DevelopersNoSQL Attack VectorsHow to secure NoSQL Deployments
Buzzword
Traditional Relational solutions not appropriate for this magnitude of Data
Attacker compromised a user of the application using a CSFR, They execute the command on the DB on the Attackers behalf
Post crap data into the databasePost Script data into the database – give yourself access to moreFull control, bypassing the firewall as you are using a trusted client