Cargando…

Securing SQL server : protecting Your database from attackers /

SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cherry, Denny (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam, Netherlands : Syngress, 2015.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Title Page; Copyright Page; Dedication; Contents; Author Biography; Technical Editor Biography; Acknowledgments; Introduction; Chapter 1
  • Identifying Security Requirements; Information in this chapter:; What are security objectives?; Personally Identifiable Information; When should security objectives been identified?; How to identify security objectives?; Chapter 2
  • Securing the Network; Information in this chapter; Securing the network; Network Firewalls; Web Server on the Public Internet Network; Web Server on the Internal Side of the Network; Web Server in the Demilitarized Zone.
  • Server FirewallsWindows Firewall Inbound Rules; Windows Firewall Outbound Rules; Special Requirements for Clustering; Direct Internet Access; Public IP addresses versus private IP addresses; vLANs; Accessing SQL server from home; Setting up Routing and Remote Access; Allowing Users to VPN in to the Network; Setting up Client VPN Connection; Physical security; Keep Your Hands Off My Box; Open Network Ports; Unlocked Workstations; Automatically Locking Computers; Social engineering; Finding the instances; Testing the network security; Antivirus installation on SQL servers; Summary; References.
  • Chapter 3
  • Key ManagementInformation in this chapter; Service master key; Database master key; Encryption password management; Enterprise key management; High availability and disaster recovery for key management; Conclusions; Chapter 4
  • Database Encryption; Information in this chapter:; Database encryption; Hashing versus Encryption; Triple DES; RC Algorithms; Advanced Encryption Standard; Hashing; SHA2 and SQL Server; Encrypting Objects; Encrypting data within tables; Encrypting within Microsoft SQL Server; Encrypting Within the Application Tier.
  • Moving From Plain Text to Encrypted Values in an Existing ApplicationEncrypting data at rest; TDE and Filestream; Log Shipping, Database Mirroring and AlwaysOn Availability Groups; Key Protection; Encrypting data on the wire; SQL Server Over SSL; SQL Server 7 and 2000; SQL Server 2005 and Up; Certificate Strength Differences; Managing SSL Certificates; Hiding the Instance; IP Sec; Encrypting data with MPIO drivers; PowerPath Encryption with RSA Requirements and Setup; Encrypting data via HBAs; Summary; References; Chapter 5
  • SQL Password Security; Information in this chapter:; Login types.
  • SQL Authentication LoginWindows Authentication Login; Domain Accounts; Local Accounts; Certificate Authentication; Asymmetric Key Login; Credentials; SQL server password security; Extended Protection; Service Principal Names; Strong passwords; Password change policies; Renaming the SA account; Disabling the SA account; Users versus logins; Contained database users in SQL server 2012 and beyond; Schemas; SQL Server 2000 and Below; SQL Server 2005 and Above; Domain Groups and Default Schemas; Setting the Default Schema; Encrypting client connection strings; SQL Reporting Services.