Articles | Open Access | DOI: https://doi.org/10.37547/tajet/Volume06Issue10-03

METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS

Asha Seshagiri , Software Development Engineer 3 at Expedia, Austin Texas, USA

Abstract

This paper discusses methods for preventing SQL (Structured Query Language) injections in identity and access control (IAM) systems. SQL injections represent one of the most serious threats to web security, allowing attackers to gain unauthorized access to and modify data. The main security methods include filtering input data, using prepared statements and parameterization, implementing stored procedures, restricting access rights, and regularly updating software. Effective privilege management and database activity monitoring also play a key role in preventing attacks. The introduction of these measures helps protect confidential information, ensures reliable authentication and authorization, and maintains data integrity. The paper highlights the importance of an integrated approach to database security in the face of growing cyber threats.

Zenodo DOI:- https://doi.org/10.5281/zenodo.13895346

Keywords

SQL injection, programming, identity and access management systems

References

The attack of the Kaseya VSA ransomware. [Electronic resource] Access mode: https://en.wikipedia.org/wiki/Kaseya_VSA_ransomware_attack (accessed 06/20/2024).

More than 200 organizations have become victims of violations related to information technology MOVE. [Electronic resource] Access mode: https://www.axios.com/2023/07/07/moveit-hack-200-target-millions-victims (accessed 06/20/2024).

Types of SQL Injection (SQLi). [Electronic resource] Access mode: https://www.geeksforgeeks.org/types-of-sql-injection-sqli/ (access date 06/20/2024).

What is identity and access management (IAM). [Electronic resource] Access mode: https://www.ibm.com/topics/identity-access-management (access date 06/20/2024).

What IAM is and what it does. [Electronic resource] Access mode: https://www.microsoft.com/en-us/security/business/security-101/what-is-identity-access-management-iam (access date 06/20/2024).

Top Identity and Access Management Systems | IAM | Open Source | Enterprise. [Electronic resource] Access mode: https://medium.com/@devops.ent/top-identity-and-access-management-systems-iam-open-source-enterprise-92cf66560a55 (access date 06/20/2024).

How to Prevent SQL Injection: 5 Key Prevention Methods. [Electronic resource] Access mode: https://www.esecurityplanet.com/threats/how-to-prevent-sql-injection-attacks/

How to Prevent SQL Injection Attacks: Essential Tips and Best Practices. [Electronic resource] Access mode: https://www.sql-easy.com/learn/how-to-prevent-sql-injection-attacks/ (access date 06/20/2024).

Article Statistics

Copyright License

Download Citations

How to Cite

Asha Seshagiri. (2024). METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS. The American Journal of Engineering and Technology, 6(10), 17–22. https://doi.org/10.37547/tajet/Volume06Issue10-03