Data Management

Identifying Database Privilege Abuse by Malicious Insiders

Watch Now Free registration required

Executive Summary

In this webcast, the presenters say about example of database privilege abuse relates to direct database attacks without Web applications. A malicious insider can decompile a fat desktop Java client to glean credential information allowing him to directly access the database with elevated privileges.

  • Format: Webcast
  • Size: 0 KB