Read the case example about Susan the SQL Programmer below:

“Susan was an SQL programmer working at a reputable company. Susan and her husband had been happily married for almost 10 years. Susan wanted to give a surprise gift to her husband on their 10th wedding anniversary. was a well-known online shopping portal that was offering quality products with good discounts on gift items. It was also offering gift vouchers to customers who purchased their products. Susan decided to purchase the gift from She ordered a costly gift for her husband much in advance, as she wanted the gift to be delivered on the anniversary day. She eagerly waited for the gift.

But things did not work the way she wanted; the gift she had ordered was not delivered on the anniversary day. She wanted to know why the company failed to deliver. She searched the Web site for contact numbers. She tried to contact the management of the shopping portal but could not get any response. After many failed attempts, in frustration, she decided to take revenge on the shopping portal.

Susan searched the internet to find security vulnerabilities related to shopping portals. She searched various security-related Web sites and vulnerability databases on the Internet. Finally, she found an online forum where some user had posted the SQL vulnerabilities of Half of Susan’s work was done. Being an SQL programmer herself, she knew how the SQL vulnerabilities of a shopping portal could be exploited. She crafted an SQL statement and inserted that statement in place of a username in the portal’s user registration form. She was able to access the entire database of It was the best chance for her to take revenge on the shopping portal.”

Write a two to four (2-4) page paper in which you:

  1. Analyze the SQL injection steps that Susan used that enabled her to access the database.
  2. Describe at least two (2) tools that Susan could have used to assisther in the attack described within the case example, and suggest thekey benefits that the chosen tools provide hackers. Justify yourresponse.
  3. Examine the critical manner in which different database systems(e.g., Oracle, MySQL, or Microsoft SQL Server-based, etc.) can play asignificant role in the SQL injection attack steps.
  4. Suggest at least two (2) security controls that E-shopping4u.comcould have implemented in order to mitigate the risks of SQL injection.Further, determine whether or not you believe Susan’s attack would havebeen successful if such security controls were in place.
  5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Leave a Reply

Your email address will not be published. Required fields are marked *