Database Security for PHP Rohan Faye
Contents Introduction
Designing databases
Connecting to database
Encrypted storage model
SQL injection
Avoiding techniques
Conclusion
Introduction Databases: cardinal components of any web based application
Provides varying dynamic content
Stores sensitive or secreat information
PHP cannot protect your database by itself
“Defense in depth”
Designing databases Create the database
Grant the privileges in order to allow other users to use it
Applications should never connect to the database as its  owner  or a  superuser
Stop intruders from gaining access by assigning limited rights to the database objects
Designing databases Avoid implementing all the log in the web application
Use views, triggers or rules Transparency
Automatically handle fields
Provides insight when debugging problems
Ability to trace back transactions

More Related Content

PPT
Database Security
PPTX
Covert channels: A Window of Data Exfiltration Opportunities
PPTX
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
PDF
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
PDF
Database security
PPTX
Database security
PPTX
Database Security And Authentication
PPTX
Database security
Database Security
Covert channels: A Window of Data Exfiltration Opportunities
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Database security
Database security
Database Security And Authentication
Database security

What's hot (20)

PPTX
Database Security Management
PPTX
Database security
PPT
Technical seminar on Security
PPTX
Data base security and injection
PPTX
DBMS SECURITY
PPTX
System security
PPTX
Security of the database
PPT
OS Database Security Chapter 6
PDF
Database Security
PPT
Network Security 1st Lecture
PDF
Data security and Integrity
PPTX
Data encryption in database management system
PPTX
Network attacks
PPTX
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PPTX
Data Network Security
PPT
Database security
 
PPT
Database Security
DOC
Honeypot Essentials
PDF
Network Security of Windows Servers
PPTX
Database security
Database Security Management
Database security
Technical seminar on Security
Data base security and injection
DBMS SECURITY
System security
Security of the database
OS Database Security Chapter 6
Database Security
Network Security 1st Lecture
Data security and Integrity
Data encryption in database management system
Network attacks
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Data Network Security
Database security
 
Database Security
Honeypot Essentials
Network Security of Windows Servers
Database security
Ad

Similar to Database security for PHP (20)

PPT
Php My Sql Security 2007
PPT
secure php
PPTX
Sql injection
PDF
null Bangalore meet - Php Security
PPTX
Sql Injection attacks and prevention
PPTX
Secure Programming In Php
PPT
SQLSecurity.ppt
PPT
SQLSecurity.ppt
PPTX
The Spy Who Loathed Me - An Intro to SQL Server Security
PPT
PHPUG Presentation
PPT
Sql injection attacks
PDF
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
ODP
Security In PHP Applications
PPT
Sql security
PPT
Sql Injection Adv Owasp
PPT
Advanced SQL Injection
PPT
Sql injection attacks
PPT
Eight simple rules to writing secure PHP programs
PDF
Safety LAMP: data security & agile languages
PPT
Sql injection attacks
Php My Sql Security 2007
secure php
Sql injection
null Bangalore meet - Php Security
Sql Injection attacks and prevention
Secure Programming In Php
SQLSecurity.ppt
SQLSecurity.ppt
The Spy Who Loathed Me - An Intro to SQL Server Security
PHPUG Presentation
Sql injection attacks
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
Security In PHP Applications
Sql security
Sql Injection Adv Owasp
Advanced SQL Injection
Sql injection attacks
Eight simple rules to writing secure PHP programs
Safety LAMP: data security & agile languages
Sql injection attacks
Ad

Recently uploaded (20)

PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
Modernising the Digital Integration Hub
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
The various Industrial Revolutions .pptx
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Architecture types and enterprise applications.pdf
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Microsoft Excel 365/2024 Beginner's training
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Module 1.ppt Iot fundamentals and Architecture
Improvisation in detection of pomegranate leaf disease using transfer learni...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Modernising the Digital Integration Hub
Taming the Chaos: How to Turn Unstructured Data into Decisions
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
The various Industrial Revolutions .pptx
Flame analysis and combustion estimation using large language and vision assi...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
A contest of sentiment analysis: k-nearest neighbor versus neural network
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Getting started with AI Agents and Multi-Agent Systems
Comparative analysis of machine learning models for fake news detection in so...
OpenACC and Open Hackathons Monthly Highlights July 2025
Training Program for knowledge in solar cell and solar industry
Architecture types and enterprise applications.pdf
TEXTILE technology diploma scope and career opportunities
Final SEM Unit 1 for mit wpu at pune .pptx
Microsoft Excel 365/2024 Beginner's training

Database security for PHP