Data Management

Identifying Database Privilege Abuse by Malicious Insiders

Date Added: Jan 2011
Format: Webcast

In this webcast, the presenters say about example of database privilege abuse relates to direct database attacks without Web applications. A malicious insider can decompile a fat desktop Java client to glean credential information allowing him to directly access the database with elevated privileges.