SlideShare a Scribd company logo
Database Security for PHP Rohan Faye
Contents Introduction
Designing databases
Connecting to database
Encrypted storage model
SQL injection
Avoiding techniques
Conclusion
Introduction Databases: cardinal components of any web based application
Provides varying dynamic content
Stores sensitive or secreat information
PHP cannot protect your database by itself
“Defense in depth”
Designing databases Create the database
Grant the privileges in order to allow other users to use it
Applications should never connect to the database as its  owner  or a  superuser
Stop intruders from gaining access by assigning limited rights to the database objects
Designing databases Avoid implementing all the log in the web application
Use views, triggers or rules Transparency
Automatically handle fields
Provides insight when debugging problems
Ability to trace back transactions
Ad

Recommended

Database Security
Database Security
alraee
 
Covert channels: A Window of Data Exfiltration Opportunities
Covert channels: A Window of Data Exfiltration Opportunities
Joel Aleburu
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Falgun Rathod
 
Database security
Database security
Murchana Borah
 
Database security
Database security
Zubair Rahim
 
Database Security And Authentication
Database Security And Authentication
Sudeb Das
 
Database security
Database security
afzaalkhalid1
 
Database Security Management
Database Security Management
Ahsin Yousaf
 
Database security
Database security
MaryamAsghar9
 
Technical seminar on Security
Technical seminar on Security
STS
 
Data base security and injection
Data base security and injection
A. Shamel
 
DBMS SECURITY
DBMS SECURITY
Wasim Raza
 
System security
System security
ReachLocal Services India
 
Security of the database
Security of the database
Pratik Tamgadge
 
OS Database Security Chapter 6
OS Database Security Chapter 6
AfiqEfendy Zaen
 
Database Security
Database Security
Ferdous Pathan
 
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
Data security and Integrity
Data security and Integrity
Zaid Shabbir
 
Data encryption in database management system
Data encryption in database management system
Rabin BK
 
Network attacks
Network attacks
Manjushree Mashal
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
Data Network Security
Data Network Security
Atif Rehmat
 
Database security
Database security
CAS
 
Database Security
Database Security
RabiaIftikhar10
 
Honeypot Essentials
Honeypot Essentials
Anton Chuvakin
 
Network Security of Windows Servers
Network Security of Windows Servers
Gerardo T. Ortega Carrasquillo
 
Database security
Database security
Arpana shree
 
Php My Sql Security 2007
Php My Sql Security 2007
Aung Khant
 
secure php
secure php
Riyad Bin Zaman
 

More Related Content

What's hot (20)

Database Security Management
Database Security Management
Ahsin Yousaf
 
Database security
Database security
MaryamAsghar9
 
Technical seminar on Security
Technical seminar on Security
STS
 
Data base security and injection
Data base security and injection
A. Shamel
 
DBMS SECURITY
DBMS SECURITY
Wasim Raza
 
System security
System security
ReachLocal Services India
 
Security of the database
Security of the database
Pratik Tamgadge
 
OS Database Security Chapter 6
OS Database Security Chapter 6
AfiqEfendy Zaen
 
Database Security
Database Security
Ferdous Pathan
 
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
Data security and Integrity
Data security and Integrity
Zaid Shabbir
 
Data encryption in database management system
Data encryption in database management system
Rabin BK
 
Network attacks
Network attacks
Manjushree Mashal
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
Data Network Security
Data Network Security
Atif Rehmat
 
Database security
Database security
CAS
 
Database Security
Database Security
RabiaIftikhar10
 
Honeypot Essentials
Honeypot Essentials
Anton Chuvakin
 
Network Security of Windows Servers
Network Security of Windows Servers
Gerardo T. Ortega Carrasquillo
 
Database security
Database security
Arpana shree
 
Database Security Management
Database Security Management
Ahsin Yousaf
 
Technical seminar on Security
Technical seminar on Security
STS
 
Data base security and injection
Data base security and injection
A. Shamel
 
Security of the database
Security of the database
Pratik Tamgadge
 
OS Database Security Chapter 6
OS Database Security Chapter 6
AfiqEfendy Zaen
 
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
Data security and Integrity
Data security and Integrity
Zaid Shabbir
 
Data encryption in database management system
Data encryption in database management system
Rabin BK
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
Data Network Security
Data Network Security
Atif Rehmat
 
Database security
Database security
CAS
 

Similar to Database security for PHP (20)

Php My Sql Security 2007
Php My Sql Security 2007
Aung Khant
 
secure php
secure php
Riyad Bin Zaman
 
Sql injection
Sql injection
Hemendra Kumar
 
null Bangalore meet - Php Security
null Bangalore meet - Php Security
n|u - The Open Security Community
 
Sql Injection attacks and prevention
Sql Injection attacks and prevention
helloanand
 
Secure Programming In Php
Secure Programming In Php
Akash Mahajan
 
SQLSecurity.ppt
SQLSecurity.ppt
LokeshK66
 
SQLSecurity.ppt
SQLSecurity.ppt
CNSHacking
 
The Spy Who Loathed Me - An Intro to SQL Server Security
The Spy Who Loathed Me - An Intro to SQL Server Security
Chris Bell
 
PHPUG Presentation
PHPUG Presentation
Damon Cortesi
 
Sql injection attacks
Sql injection attacks
chaitanya Lotankar
 
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
Felipe Prado
 
Security In PHP Applications
Security In PHP Applications
Aditya Mooley
 
Sql security
Sql security
Safwan Hashmi
 
Sql Injection Adv Owasp
Sql Injection Adv Owasp
Aung Khant
 
Advanced SQL Injection
Advanced SQL Injection
amiable_indian
 
Sql injection attacks
Sql injection attacks
Nitish Kumar
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
Aleksandr Yampolskiy
 
Safety LAMP: data security & agile languages
Safety LAMP: data security & agile languages
PostgreSQL Experts, Inc.
 
Sql injection attacks
Sql injection attacks
Kumar
 
Php My Sql Security 2007
Php My Sql Security 2007
Aung Khant
 
Sql Injection attacks and prevention
Sql Injection attacks and prevention
helloanand
 
Secure Programming In Php
Secure Programming In Php
Akash Mahajan
 
SQLSecurity.ppt
SQLSecurity.ppt
LokeshK66
 
SQLSecurity.ppt
SQLSecurity.ppt
CNSHacking
 
The Spy Who Loathed Me - An Intro to SQL Server Security
The Spy Who Loathed Me - An Intro to SQL Server Security
Chris Bell
 
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
Felipe Prado
 
Security In PHP Applications
Security In PHP Applications
Aditya Mooley
 
Sql Injection Adv Owasp
Sql Injection Adv Owasp
Aung Khant
 
Advanced SQL Injection
Advanced SQL Injection
amiable_indian
 
Sql injection attacks
Sql injection attacks
Nitish Kumar
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
Aleksandr Yampolskiy
 
Safety LAMP: data security & agile languages
Safety LAMP: data security & agile languages
PostgreSQL Experts, Inc.
 
Sql injection attacks
Sql injection attacks
Kumar
 
Ad

Recently uploaded (20)

UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Ad

Database security for PHP