SQL injection attack

What are some recent attacks on organizations that resulted in a Database breach? How would you harden a database to prevent hacking? How would you harden a webserver from SQL injection? What types of tools and practices could you utilize? What forms of authentication can be implemented for a web application? Describe the authentication techniques and the level of security provided by each. Describe and discuss the Web Application Threats.        

Sample Solution