5
CHAPTER 2
THEORETICAL FOUNDATION
2.1 Theoretical Foundation
This chapter covers about the appropriate
theories that
needed
to be clarified
in order
to
support
the technique
used to introduce
network
security.
All the terms and
theories are
explained in detail in this chapter.
2.2 SQL Injection
According
to
Zelinski
Radu
in Technical
University
of
Moldova,
SQL[6]
is
a
programming language used for manipulating data in database. SQL statements recently
used
for
database
management
systems
such
as
DB2,
SQL,
ORACLE,
Sybase,
SQL
Base, and INFORMIX.
Although
there
are
standardization from
ANSI
(American National
Standards
Institute)
but the creators of database
management systems
usually
added something different,
so
as a result, each SQL command are
unique
for
each database
management system.
That
is
one
of
the
reasons
why
every
database
management
system has
different
vulnerabilities.
|