Summary

In this chapter, you built a foundation of fundamentals. You explored what security really is and what it is not. You discovered the threats, vulnerabilities, and exploits that can be used to attack your SQL Servers either directly or indirectly. Finally, you reviewed several security principles that can act as guiding navigators through the myriad of security technologies available today. In the next chapter, you'll look specifically at authentication and encryption. The topics are covered from both a theoretical and a very practical standpoint as related to SQL Server 2008.

The fact that vulnerabilities may be exploited by anyone who can read and follow instructions shows that system cracking is a science. It is a repeatable process ...

Get SQL Server® 2008 Administration: Real World Skills for MCITP Certification and Beyond now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.