Strengthening Cybersecurity Knowledge: SQL Injection and Security Risks
In my ongoing cybersecurity studies, I recently explored SQL Injection—a critical vulnerability in web applications. This attack manipulates SQL queries to bypass authentication, extract sensitive data, modify records, or even bring down databases.
For example, an insecure query like:
sqlCopyEditSELECT * FROM users WHERE name = ' " + userName + " ';
can be exploited with:
sqlCopyEdit' OR '1' = '1';
This trick forces the database to return all users’ data, bypassing authentication. To see these vulnerabilities in action, WebGoat (https://webgoat.org) offers hands-on training environments. Strengthening input validation, prepared statements, and web application firewalls can help mitigate these risks.
Applying for Cybersecurity Jobs with a Strategic Approach
After reinforcing my knowledge of SQL Injection and authentication exploits, I transitioned into my job search. Today, I explored and applied for multiple roles, including:
- IT Support Specialist II (Southcoast Welding)
- Systems Analyst – Information Security (Scripps Health)
- Cybersecurity Analyst (Akraya, Inc.)
- Technical Support Engineer (Lytx)
- Information Systems Analyst 3 (UC San Diego)
In my applications, I emphasized my extensive experience in C# .NET, Java, SQL database management, and cybersecurity tools like Wireshark, OpenVAS, and Metasploit. One of my key projects was developing a front-office kiosk system for Rosa Parks Elementary School, streamlining visitor management. (More details: Rosa Parks Kiosk Program.)
Boosting Daily Productivity with Alexa and Todoist
To streamline my workflow, I integrated Amazon Echo with Todoist using Quick Add. Now, I can instantly schedule tasks by saying:
“Alexa, tell Quick Add to add ‘Find cybersecurity jobs Tuesday at 6 PM’.”
This simple voice command automatically adds tasks to my Android phone and computer, keeping my schedule organized. Over time, I want to develop the habit of daily task planning to improve productivity.
Winding Down: Systems Thinking and Cybersecurity
As I wrap up the night, I reflect on how cybersecurity and IT naturally align with systems-thinking perspectives. The interconnectedness of security, development, and infrastructure fascinates me—perhaps that’s why I’m drawn to this field.
Tomorrow, after work, I plan to hike Cowles Mountain before diving back into my job search and cybersecurity studies. My goal remains clear: to keep learning, applying, and growing in my cybersecurity career.