{"title":"使用Fortinet硬件保护web应用程序免受sql注入","authors":"M. O. Tsuranov","doi":"10.31673/2409-7292.2022.013843","DOIUrl":null,"url":null,"abstract":"This article analyzes the protection of web-applications using the software and hardware Fortigate 60E, as well as the need to use systems to protect web-applications. The types of sql-injection, their impact on the operation of the web-application are analyzed. The main functions and capabilities of the Fortigate 60E equipment are defined. Recommendations for the use of equipment such as Fortigate.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Protect web applications from sql-injection with Fortinet hardware\",\"authors\":\"M. O. Tsuranov\",\"doi\":\"10.31673/2409-7292.2022.013843\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article analyzes the protection of web-applications using the software and hardware Fortigate 60E, as well as the need to use systems to protect web-applications. The types of sql-injection, their impact on the operation of the web-application are analyzed. The main functions and capabilities of the Fortigate 60E equipment are defined. Recommendations for the use of equipment such as Fortigate.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"132 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.013843\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.013843","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protect web applications from sql-injection with Fortinet hardware
This article analyzes the protection of web-applications using the software and hardware Fortigate 60E, as well as the need to use systems to protect web-applications. The types of sql-injection, their impact on the operation of the web-application are analyzed. The main functions and capabilities of the Fortigate 60E equipment are defined. Recommendations for the use of equipment such as Fortigate.