Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is SQL Injection

Encyclopedia of Organizational Knowledge, Administration, and Technology
SQL injection vulnerabilities are exploited by placing database queries in the form of SQL statements into web server requests. The result is the execution of the SQL statement at the server and the return of the query results to the client.
Published in Chapter:
Cyber Crime Threats, Strategies to Overcome, and Future Trends in the Banking Industry
Atul Bamrara (Department of School Education, Government of Uttarakhand, India)
DOI: 10.4018/978-1-7998-3473-1.ch086
Abstract
Electronic banking, with its inherent advantages for the banking industry as well as the customer, is an area with tremendous growth potential. This field has also seen a corresponding increase in network security breaches, data thefts/loss, identity thefts and other white-collar crimes resulting in huge losses to the banking industry as well as the banking clientele. Losses by the banking industry worldwide due to white- collar crimes are in billions of dollars and far outstrip conventional methods of bank robbery. The unprecedented speed at which net banking has evolved, the ubiquitous and global nature of open networks and the increasing reliance on information technology have all added up to provide an environment of enhanced security challenges. Amendments in the IT act, banking regulations and the coming explosion in WAP are issues that need to be taken into account by the industry.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Hacking: Evolution, Conceptualization, and the Perpetrators
Type of online security flaw that allows interference with an online database query (ul Hassan & Ahmad, 2021).
Full Text Chapter Download: US $37.50 Add to Cart
The Detection of SQL Injection on Blockchain-Based Database
It is a kind of attack which is performed by the adversary by inserting the SQL query in the input data section of the client application.
Full Text Chapter Download: US $37.50 Add to Cart
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
It is a code injection vulnerability in which attacker injects some malicious SQL commands in to the execution field of the database.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
It is a code injection vulnerability in which attacker injects some malicious SQL commands in to the execution field of the database.
Full Text Chapter Download: US $37.50 Add to Cart
Automated Detection of SQL Injection Attack on Blockchain-Based Database
It is kind of attack which is performed by the adversary by inserting the SQL query in the input data section of client application.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR