D A T A B A S E S E C U R I T Y
Home Lesson

Two Equal Columns

WEAK AUTHENTICATION

Weak authentication schemes allow attackers to assume the identity of legitimate database users. Specific attack strategies include brute force attacks, social engineering, and so on. Implementation of passwords or two-factor authentication is a must. For scalability and ease-of use, authentication mechanisms should be integrated with enterprise directory/user management infrastructures



Countermeasure

    1 . Retain password history to prevent re-use.
    2 . Use of multifactor authentication
    3 . Use strong sequence numbering systems.
    4 . Utilize timestamps on frames to defeat the replay attack.
    5 . Audit for excessive failed log on attempts.
    6 . Monitor the network or system for sniffing and password theft tools.
    7 . Implement account lockout to lock accounts when multiple incorrect passwords are used.
    8 . Implement a strong password policy.