Securing SQL Server: Protecting Your Database from Attackers

دانلود کتاب Securing SQL Server: Protecting Your Database from Attackers

42000 تومان موجود

کتاب ایمن سازی SQL Server: محافظت از پایگاه داده شما در برابر مهاجمان نسخه زبان اصلی

دانلود کتاب ایمن سازی SQL Server: محافظت از پایگاه داده شما در برابر مهاجمان بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 4


توضیحاتی در مورد کتاب Securing SQL Server: Protecting Your Database from Attackers

نام کتاب : Securing SQL Server: Protecting Your Database from Attackers
ویرایش : 2
عنوان ترجمه شده به فارسی : ایمن سازی SQL Server: محافظت از پایگاه داده شما در برابر مهاجمان
سری :
نویسندگان :
ناشر : Syngress
سال نشر : 2012
تعداد صفحات : 385
ISBN (شابک) : 1597499471 , 9781597499477
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 14 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Securing SQL Server
Acknowledgements
Dedication
Author Biography
About the Technical Editor
Introduction
1 Securing the Network
Securing the Network
Network Firewalls
Web Server on the Public Internet Network
Web Server on the Internal Side of the Network
Web Server in the Demilitarized Zone
Server Firewalls
Windows Firewall Inbound Rules
Windows Firewall Outbound Rules
Special Requirements for Clustering
Direct Internet Access
Public IP Addresses versus Private IP Addresses
Accessing SQL Server from home
Physical Security
Keep Your Hands Off My Box
Open Network Ports
Unlocked Workstations
Automatically Locking Computers
Social engineering
Finding the Instances
Testing the Network Security
Summary
References
2 Database Encryption
Database Encryption
Hashing versus Encryption
Triple DES
RC Algorithms
AES
Hashing
SHA2 and SQL Server
Encrypting Objects
Encrypting data within tables
Encrypting within Microsoft SQL Server
Encrypting within the Application Tier
Encrypting data at rest
TDE and FILESTREAM
Log Shipping, Database Mirroring, and Always On
Key Protection
Encrypting data on the wire
SQL Server Over SSL
SQL Server 7 and 2000
SQL Server 2005 and Up
Certificate Strength Differences
Managing SSL Certificates
Hiding the Instance
IP Sec
Encrypting data with MPIO drivers
PowerPath Encryption with RSA Requirements and Setup
Encrypting data via HBAs
Summary
References
3 SQL Password Security
SQL Server Password Security
Extended Protection
SPNs
Strong Passwords
Contained Database Logins in SQL Server 2012
Encrypting Client Connection Strings
SQL Reporting Services
Application Roles
Using Windows Domain Policies to Enforce Password Length
Windows Authentication Group Policies
Windows Domain Requirements to Use Domain Policies to Manage SQL Authentication Logins
Contained Databases
Contained Databases and Auto Close
db_owners Can Now Add New Users to the Instance
Password Policies and Contained Users
Summary
References
4 Securing the Instance
What to Install, and When?
SQL Authentication and Windows Authentication
Editing the master.mdf File
Using a Debugger to Intercept Passwords
Purchased Products
Password Change Policies
Auditing Failed Logins
Renaming the SA Account
Disabling the SA Account
Securing Endpoints
Stored Procedures as a Security Measure
Access to Base Tables Isn’t Required
Enabling Cross Database Chaining
Minimum Permissions Possible
Instant File Initialization
Linked Servers
NTLM Double Hop Problems
Securing Linked Servers
Using SQL Server Management Studio for Linked Server Security Configuration
Using T-SQL for Linked Server Security Configuration
Only Allowing Some Groups to Use a Linked Server
Using Policies to Secure Your Instance
SQL Azure Specific Settings
Instances That Leave the Office
Securing “Always On”
Securing Contained Databases
Contained Databases and Always On
Summary
5 Additional Security for an Internet Facing SQL Server and Application
SQL CLR
Extended Stored Procedures
Protecting Your Connection Strings
Database Firewalls
Clear Virtual Memory Pagefile
User Access Control (UAC)
Other Domain Policies to Adjust
Summary
6 Analysis Services
Logging into Analysis Services
Granting Administrative Rights
Granting Rights to an Analysis Services Database
Securing Analysis Services Objects
Data Sources
Cubes
Cell Data
Dimensions
Dimension Data
Mining Structures
Summary
7 Reporting Services
Setting up SSRS
Service Account
Web Service URL
Database
Report Manager URL
E-mail Settings
Execution Account
Encryption Keys
Scale-Out Deployment
Logging onto SQL Server Reporting Services for the first time
Security within Reporting Services
Item Roles
System Roles
Adding System Roles
Adding Folder Roles
Reporting Services Authentication Options
Anonymous Authentication
Forms Authentication
Security Within Reporting Services
Report Server Object Rights
Changing Permissions on an Object
Hiding Objects
Summary
8 SQL Injection Attacks
What is an SQL Injection Attack?
Why are SQL Injection attacks so successful?
How to Protect Yourself From an SQL Injection Attack
NET Protection Against SQL Injection
Protecting Dynamic SQL Within Stored Procedures from SQL Injection Attack
Using “EXECUTE AS” to Protect Dynamic SQL
Impersonating a Login
Impersonating a User
Removing Extended Stored Procedures
Not Using Best Practice Code Logic can Hurt You
What to Return to the End User
Database Firewalls
Test, Test, Test
Cleaning Up the Database After an SQL Injection Attack
Other Front-End Security Issues
The Web Browser URL is Not the Place for Sensitive Data
Using xEvents to Monitor For SQL Injection
Summary
Reference
9 Database Backup Security
Overwriting Backups
Deleting Old Backups
Media Set and Backup Set Passwords
Backup Encryption
LiteSpeed for SQL Server
Red Gate SQL HyperBac
Red Gate SQL Backup
Third-Party Tape Backup Solutions
Transparent Data Encryption
Securing the Certificates
Compression and Encryption
Encryption and Data Deduplication
Offsite Backups
Summary
References
10 Storage Area Network Security
Securing the Array
Locking Down the Management Ports
Authentication
User Access to the Storage Array
Locking Down the iSCSI Ports
LUN Security
Moving LUNs
Deleting LUNs
Snapshots and Clones
Securing the Storage Switches
Fiber Channel
iSCSI
Fiber Channel over Ethernet
Management Ports
Authentication
Zone Mapping
Summary
11 Auditing for Security
Login Auditing
SQL Server 2005 and Older
SQL Server 2008 and Newer
Using xEvents for Auditing Logins
Capturing Login Information
Event Loss Settings
Viewing Login Audits
Auditing sysadmin Domain Group Membership
Data Modification Auditing
Change Data Capture Configuration
Querying Changed Data
Using xEvents For Data Modification Auditing
Using SQL Server Audit for Data Modification
Data Querying Auditing
Schema Change Auditing
Using Extended Events for Schema Change Auditing
Using Policy-Based Management to Ensure Policy Compliance
C2 Auditing
Common Criteria Compliance
Summary
References
12 Server Rights
SQL Server Service Account Configuration
One Account for All Services
SQL Server 2012’s AlwaysOn
One Account Per Sever
One Account for Each Service
Using Local Service Accounts for Running SQL Server Services
Credentials
SQL Server Agent Proxy Accounts
OS Rights Needed by the SQL Server Service
Windows System Rights
SQL Server’s NTFS Permissions
OS Rights Needed by the DBA
Dual Accounts
OS Rights Needed to install service packs
OS Rights Needed to Access SSIS Remotely
Console Apps must die
Fixed-Server Roles
User Defined Server Roles
AlwaysOn
Instance Wide Permissions
Fixed Database Roles
Fixed Database Roles in the msdb Database
User Defined Database Roles
Default Sysadmin Rights
Vendor’s and the Sysadmin Fixed-Server Role
Summary
13 Securing Data
Granting Rights
Denying rights
REVOKEing rights
Column Level Permissions
Row Level Permissions
Summary
A External Audit Checklists
PCI DSS
PCI Checklist
Sarbanes-Oxley
Sarbanes-Oxley Checklist
HIPPA
HIPPA Checklist
Summary
Reference
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Z
Copyright




پست ها تصادفی