Loading

Build a Web Application with Precautions to Prevent SQL Injection Attack
Mugdha Parande1, Bhushan Hajare2

1Ms. Mugdha Parande, M.E, Department of Computer Engineering, Shri LR Tiwari Engineering College, Bhayandar (Maharashtra), India.
2Mr. Bhushan Hajare, B.E, Department of Information Technology, DKTE Engineering and Textiles, Ichalkaranji (Maharashtra), India.
Manuscript received on 12 October 2013 | Revised Manuscript received on 20 October 2013 | Manuscript Published on 30 October 2013 | PP: 19-22 | Volume-3 Issue-5, October 2013 | Retrieval Number: E1226103513/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper explain SQL Injection, one of the most commonly exploited vulnerabilities found in web applications and second, In this outline possible steps which we can take to ensure that our website is protected from SQL Injection attacks.
Keywords: SQLIA, SQL Injection Attack, Tutology, Blind SQL, Precaution.

Scope of the Article: Web Technologies