The database is a prime target for application level attacks. Application level attacks are used to exploit vulnerabilities in your data access code to gain access to the database. If all other attack vectors are closed, then the application's front door, port 80, becomes the path of choice for an attacker to steal, manipulate, and destroy data.
This chapter shows you how to build secure data access code and avoid common vulnerabilities and pitfalls. The chapter presents a series of countermeasures and defensive techniques that you can use in your data access code to mitigate the top threats related to data access.