From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

SQL injection attacks

SQL injection attacks

(soft music) - [Instructor] A very common attack is a SQL injection attack. And it's very popular because it's very easy to execute or at least to attempt to execute. And in this video, we'll consider how a SQL injection attack works. First, let's consider what a relational database is because SQL is a programming language that works on a relational database. But a relational database is a collection of data that is structured into different tables. And these tables, much like a spreadsheet, have rows. In the database world though, those rows are called records. And these tables have columns, which in a database are called fields, and there is a defined relationship between the tables. So imagine we're working with a massive data set. Maybe it's customer information. We might have credit card information. We might have medical records. We can have all sorts of data stored amongst these tables in a relational database. And the sheer amount of data might make it impractical for us to…

Contents