SQL Injection Attacks, Visually Explained.

Jack Leonard
Visually Explained
Published in
1 min readAug 13, 2015

At Barricade our mission statement is to ‘democratise security through simplicity’ and this permeates through everything we do, Our motive with these infographics is to distill complex, ‘black-box’ security semantics into visual explainers detailing their narrative in a comprehensive manner.

Below we’ve explained how an SQL Injection Attack occurs & what regular user flow looks in contrast to illegitimate user flow. We’ve also added some surprising statistics on SQL Injection Attacks & Some industry standard mitigation practices.

SQL Injection Attacks are one of the most common forms of attack, often ending in large scale infamous Data Breaches, Data Larceny & Data Reconnaissance. ( Recent infamous victims of SQL Injection Attacks: Barracuda Networks, Heartland Payment Systems, Nasa, Bell (Canada) & Many More)

For more information on how you can better protect your site and your organization, check out www.barricade.io.

--

--

Jack Leonard
Visually Explained

Jack Leonard is an Irish Entrepreneur, Product Designer & Developer who is fascinated by human behaviour.