Cyber Defense Magazine – August 2019

(Nora) #1

Zero Day Attacks and not current WordPress or plugins allow Hackers to perform a data breach and steal
confidential database data. A Zero Day Attack is the time between when a security vulnerability in a
software plugin is published by the author and the updated plugin is applied to a web site to prevent a
data breach. Hackers will be aware of the Zero Day vulnerability once it has been publicly announced.
Hackers will now attempt to exploit it immediately to gain inside access to the Security Perimeter and
steal confidential web site database data.


Other content management system (CMS) such as Joomia and Drupal web sites are also vulnerable to
data breaches by Hackers or Rogue Insiders for the same reasons. The 51.3% of Internet websites
that don’t use a content management system likewise are vulnerable to database data breaches for many
of the same reasons.


How to Protect Confidential Web Site Database Data from Hackers or Rogue Insiders?


Confidential web site database data includes: credit card, tax ID, medical, social media, corporate,
manufacturing, law enforcement, defense, homeland security and public utility data. This data is almost
always stored in Cassandra, DB2, Informix, MongoDB, MariaDB, MySQL, Oracle, PostgreSQL, SAP
Hana, SQL Server and Sybase databases. Once inside the security perimeter commonly installed
database utilities can be used by Hackers or Rogue Insiders to steal confidential database data.


Non-intrusive network sniffing can capture the normal database query or SQL activity from a network tap
or proxy server with no impact upon the database server. This SQL activity is quite predictable. Database
servers servicing 10,000 end-users typically process daily 2,000 to 10,000 unique query or SQL
operations that run millions of times a day.


Advanced SQL Behavorial Analysis of the Web Site Database Query or SQL Activity


Advanced SQL Behavioral Analysis of the web site SQL activity learns what the normal query activity is.
Now from a network tap or proxy server the database query and SQL activity can be non-intrusively
monitored in real-time and non-normal SQL activity immediately identified. Non-normal SQL activity from
a Hackers or Rogue Insiders can be detected in a few milli seconds. The Hacker database session can
be immediately terminated and the Security Team notified so that confidential database data is not stolen.


Advanced SQL Behavioral Analysis of the query activity can go even further and learn the maximum
amount of data queried plus the IP addresses all queries were submitted from for each of the unique SQL
queries sent to a database. This type of data protection can detect never before observed query activity,
queries sent from a never observed IP address and queries sending more data to an IP address than the
query has ever sent before. This allows real-time detection of Hackers and Rogue Insiders attempting to
steal confidential web site database data. Once detected the security team can be notified within a few
seconds so that a data breach is prevented.

Free download pdf