Aerosol Posted January 14, 2015 Report Posted January 14, 2015 Part 1. IntroductionPonemon Institute is pleased to present the findings of The SQL Injection Threat Studysponsored by DB Networks. The purpose of this research is to understand how organizationsrespond to the SQL injection threat and their awareness about different approaches to managingthis risk.The study surveyed 595 individuals who work in IT and IT security. The majority of respondentsare familiar with core IDS technologies that detect rogue SQL statements on the network thatconnect the web application to the database.SQL injections have been defined as being used to attack data driven applications, in whichmalicious SQL statements are inserted into an entry field for execution (e.g. to dump thedatabase contents to the attacker). SQL injections exploit security vulnerabilities in anapplication’s software. SQL injection is most commonly known as an attack vector through publicfacing websites but can be used to attack SQL databases in a variety of ways.The most salient findings are shown below:? The SQL threat is taken seriously because 65 percent of organizations represented in thisstudy experienced a SQL injection attack that successfully evaded their perimeter defensesin the last 12 months.? Almost half of respondents (49 percent) say the SQL injection threat facing their company isvery significant. On average, respondents believe 42 percent of all data breaches are due, atleast in part, to SQL injections.? Many organizations are not familiar with the techniques used by cyber criminals. Less thanhalf of respondents (46 percent) are familiar with the term Web Application Firewalls (WAF)bypass. Only 39 percent of respondents are very familiar or familiar with the techniques cybercriminal use to get around WAF perimeter security devices.? BYOD makes understanding the root causes of an SQL injection attack more difficult. Fiftysixpercent of respondents say determining the root causes of SQL injection is becomingmore difficult because of the trend for employees to use their personally owned mobiledevices (BYOD) in the workplace. Another challenge, according to 41 percent ofrespondents, is increasing stealth and/or sophistication of cyber attackers.? Expertise and the right technologies are critical to preventing SQL injection attacks. Whilerespondents see the SQL threat as serious, only 31 percent say their organization’s ITsecurity personnel possess the skills, knowledge and expertise to quickly detect a SQLinjection attack and 34 percent agree that they have the technologies or tools to quicklydetect a SQL injection attack.? Measures to prevent SQL injection attacks are also lacking. Despite concerns about thethreat, 52 percent do not take such precautions as testing and validating third party softwareto ensure it is not vulnerable to SQL injection attack.? Organizations move to a behavioral analysis solution to combat the SQL injection threat.Eighty-eight percent of respondents view behavioral analysis either very favorably orfavorably. Read more: http://www.dbnetworks.com/pdf/ponemon-the-SQL-injection-threat-study.pdf Quote