JLU1.WORDPRESS.COM
Jia's WordPressLeave a comment ». When users (or applications) are granted database access privileges that exceed the requirements. Of their job function, these privileges may be abused for malicious purposes. The solution to the threat posed by excessive privileges is:. Elimination of Excessive Rights. And Enforcement through Query-Level Access Control. This requires the ability to identify identify excessive rights. Correlation of rights with the business user. And analysis of these rights. Attackers may take advanta...
http://jlu1.wordpress.com/


