{"title":"数据库安全——一个矛盾修饰法?","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70485-2","DOIUrl":null,"url":null,"abstract":"<div><p>Penetration testing often reveals the same old security issues, particularly with regard to the configuration and maintenance of databases. Some of these recurrent security problems are generic and affect nearly every database we have tested. Others are associated only with a particular vendor or version.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 42"},"PeriodicalIF":0.0000,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70485-2","citationCount":"0","resultStr":"{\"title\":\"Database security — an oxymoron?\",\"authors\":\"Ken Munro\",\"doi\":\"10.1016/S1742-6847(06)70485-2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Penetration testing often reveals the same old security issues, particularly with regard to the configuration and maintenance of databases. Some of these recurrent security problems are generic and affect nearly every database we have tested. Others are associated only with a particular vendor or version.</p></div>\",\"PeriodicalId\":100673,\"journal\":{\"name\":\"Infosecurity Today\",\"volume\":\"3 6\",\"pages\":\"Page 42\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70485-2\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Infosecurity Today\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1742684706704852\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Infosecurity Today","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1742684706704852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Penetration testing often reveals the same old security issues, particularly with regard to the configuration and maintenance of databases. Some of these recurrent security problems are generic and affect nearly every database we have tested. Others are associated only with a particular vendor or version.