Identifying Database Privilege Abuse by Malicious Insiders

In this webcast, the presenters say about example of database privilege abuse relates to direct database attacks without Web applications. A malicious insider can decompile a fat desktop Java client to glean credential information allowing him to directly access the database with elevated privileges.

Provided by: Imperva Topic: Data Management Date Added: Jan 2011 Format: Webcast

Find By Topic