Database Security for Developers
Database is the core of many systems. If you are building an e-commerce website, government portal, health management system or just a blog, you need a database.
Information security is a big problem nowadays. It does not matter how big and famous your application, websites or company are, you might be a target for the next attack. Moreover, most of attacks are automated.
Database security system usually the last security layer between your data and hackers. Suddenly, this is also mostly underused security functionality in modern applications. You may find many books and papers about network security, firewalls, cryptography and even application security, but not database security.
In the following session, I am going to introduce the audience to SQL Server's security system. The audience will learn about authentication, authorization, roles, permissions and data encryption. We will talk about database security best practices which can help you to protect data even when your application has been compromised. The ideas from the session might be applicable to other database management systems.
Database is the core of many systems. If you are building an e-commerce website, government portal, health management system or just a blog, you need a database.
Information security is a big problem nowadays. It does not matter how big and famous your application, websites or company are, you might be a target for the next attack. Moreover, most of attacks are automated.
Database security system usually the last security layer between your data and hackers. Suddenly, this is also mostly underused security functionality in modern applications. You may find many books and papers about network security, firewalls, cryptography and even application security, but not database security.
In the following session, I am going to introduce the audience to SQL Server's security system. The audience will learn about authentication, authorization, roles, permissions and data encryption. We will talk about database security best practices which can help you to protect data even when your application has been compromised. The ideas from the session might be applicable to other database management systems.