Safe Guard Anomalies against SQL Injection Attacks

  • Rawat R
  • Singh Dangi C
  • Patil J
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

For internet, web application exists and for web application syntax, semantics, coding and design exists, and for coding and designing, algorithm exists, and for algorithm, protecting techniques and rules exists, But as the internet technologies advanced, vulnerability also advanced.Various old procedures, algorithm functions, coding and designing syntax and semantics are there, which are vulnerable to attack and if used could be easily traced or hacked by the attacker. Old practices which are vulnerable should be banned in organization, companies and govt. sectors and secure guidelines should be issued, which consists of security guildelines.and should be strictly followed. In this paper we have proposed coding flaws at different platforms and their solutions.

Cite

CITATION STYLE

APA

Rawat, R., Singh Dangi, C., & Patil, J. (2011). Safe Guard Anomalies against SQL Injection Attacks. International Journal of Computer Applications, 22(2), 11–14. https://doi.org/10.5120/2558-3511

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free