1. Read the text on the image below. Let's start at the beginning - what is SQL?
3. A large number of online websites that have a database driven features (e.g. have customer's signing up) will use SQL databases
4. Here is an example of an SQL statement. It is selecting the fields firstname and lastname from a table…..
5. Which of the following statements about the SQL injection is true?
6. SQL injection usually occurs when you ask a user for input, like their username/userid, and instead of a name/id ….
7. Analyse the code below. The original/intended purpose of the code was to …
8. Why would or could this be dangerous?
9. An example of an SQL injection is: A hacker might get access to all the user names and passwords in a database, by simply inserting 105 OR 1=1 into the input field.
10. Read through the example below. Why could this be dangerous?
11. Select which SQL statement will do what the description says.
12. Analyse the image and what is happening below. What would the resulting SQL statement be?
13. To protect a web site from SQL injection, you can use SQL _______________
14. SQL parameters are values that are added to an SQL query at execution time, in a controlled manner.
16. SQL injection (SQLI) was considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project.
17. Blind SQL Injection is used when a web application is vulnerable to an SQL injection and the results of the injection are wholly visible to the attacker
18. In 2015, an SQL injection attack stole the personal details of 156,959 customers from British telecommunications company TalkTalk's servers
19. In 2009, the US Department of Justice charged an American, Albert Gonzalez, and two unnamed Russians with the theft of 130 million credit card numbers using an SQL injection attack
20. Put simply, an SQL injection is when a user tries to use …..