710: Database Attack Vectors and Techniques to Thwart Them
Slavik Markovich , Sentrigo Inc.    Biography

Objectives: How various attack vectors work
Methods of detecting and preventing attacks
Countering evasion techniques
Abstract: In this presentation, we will explain and demonstrate using a live Oracle database environment how different attack vectors can be used to own the database, including exploits that are freely available on the Web and require no skill. We will run attacks ranging from the simple to the very sophisticated and show their effects on the database. We’ll explain ways of protecting the database against each type of attack, such as secure coding practices, database hardening methods and deep-scanning database activity monitoring tools.

Audiernce Focus:
Track: Database
Date: Monday, April 14, 2008
Time: 9:15 AM - 10:15 AM