Inference Dbms
Inference Dbms
SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code
for backend database manipulation to access information that was not intended to be
displayed. This information may include any number of items, including sensitive company
data, user lists or private customer details.
When calculating the potential cost of an SQLi, it’s important to consider the loss of customer
trust should personal information such as phone numbers, addresses, and credit card details
be stolen.
While this vector can be used to attack any SQL database, websites are the most frequent
targets.
SQL is a standardized language used to access and manipulate databases to build
customizable data views for each user. SQL queries are used to execute commands, such as
data retrieval, updates, and record removal. Different SQL elements implement these tasks,
e.g., queries using the SELECT statement to retrieve data, based on user-provided
parameters.
A typical eStore’s SQL database query may look like the following
SELECT ItemName, ItemDescription
FROM Item
WHERE ItemNumber = ItemNumber
From this, the web application builds a string query that is sent to the database as a single
SQL statement
sql_query= "
SELECT ItemName, ItemDescription
FROM Item
WHERE ItemNumber = " & Request.QueryString("ItemID")
A user-provided input http://www.estore.com/items/items.asp?itemid=999 can then generates
the following SQL query
SELECT ItemName, ItemDescription
FROM Item
WHERE ItemNumber = 999
There are FOUR TYPES of access control methods: Mandatory Access Control (MAC), Role-
Based Access Control (RBAC), Discretionary Access Control (DAC), and Rule-Based Access Control
(RBAC or RB-RBAC). A method is chosen based on the level of access needed by each user, security
requirement, infrastructure, etc.
⊆ A then A → B.
Reflexive Rule: According to this rule, if B is a subset of A then A logically determines B. Formally, B
o Example: Let us take an example of the Address (A) of a house, which contains so many
parameters like House no, Street no, City etc. These all are the subsets of A. Thus, address (A)
→ House no. (B).
Augmentation Rule: It is also known as Partial dependency. According to this rule, If A logically
determines B, then adding any extra attribute doesn’t change the basic functional dependency.
o Example: A → B, then adding any extra attribute let say C will give AC → BC and doesn’t
make any change.
Transitive rule: Transitive rule states that if A determines B and B determines C, then it can be said
that A indirectly determines B.
o Example: If A → B and B → C then A → C.
Union Rule: Union rule states that If A determines B and C, then A determines BC.
o Example: If A → B and A → C then A → BC.
Decomposition Rule: It is perfectly reverse of the above Union rule. According to this rule, If A
determined BC then it can be decomposed as A → B and A → C.
o Example: If A → BC then A → B and A → C.
Pseudo Transitive Rule: According to this rule, If A determined B and BC determines D then BC
determines D.
o Example: If A → B and BC → D then AC → D.
What is data ENCRYPTION in DBMS? Encrypting data involves changing it from a readable
(plaintext) format to an unreadable, encoded one (ciphertext). Data that has been encrypted can
only be viewed or processed after it has been decrypted with a decryption key or password.
There are
two types of encryption in widespread use today: symmetric and asymmetric encryption. The
name derives from whether or not the same key is used for encryption and decryption. Encryption
is used to protect data from being stolen, changed, or compromised and works by scrambling data
into a secret code that can only be unlocked with a unique digital key.