Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Law
Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip
Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip
Journal of Digital Forensics, Security and Law
One of the risks to a company operating a public-facing website with a Structure Query Language (SQL) database is an attacker exploiting the SQL injection vulnerability. An attacker can cause an SQL database to perform actions that the developer did not intend like revealing, modifying, or deleting sensitive data. This can cause a loss of confidentiality, integrity, and availability of information in a company’s database, and it can lead to severe costs of up to $196,000 per successful injection attack (NTT Group, 2014). This paper discusses the history of the SQL injection vulnerability, focusing on:
- How an attacker can exploit …
The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse
The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse
Vanderbilt Journal of Transnational Law
The proceeds of cybercrime are typically laundered by money mules--people used by criminal organizations to interrupt the financial paper trail by transferring money for the criminals. This Article analyzes the discursive construction of the money mule in documents of national and international anti-money laundering authorities such as Financial Intelligence Units (FIUs), Europol, and the Financial Action Task Force (FATF). It shows how case study narratives, visualizations, and metaphors contribute to an understanding of the money mule as an innocent victim of organized crime networks from West Africa and Eastern Europe, supported by money remittance companies like Western Union. These constructions …