<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Chris Kiser</title>
    <description>The latest articles on DEV Community by Chris Kiser (@chriskiser18).</description>
    <link>https://dev.to/chriskiser18</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F458207%2F1a7e181e-54c8-4d2f-8282-835679b7c7f7.png</url>
      <title>DEV Community: Chris Kiser</title>
      <link>https://dev.to/chriskiser18</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/chriskiser18"/>
    <language>en</language>
    <item>
      <title>Common SQL Injections to Watch Out For</title>
      <dc:creator>Chris Kiser</dc:creator>
      <pubDate>Sun, 27 Sep 2020 20:46:40 +0000</pubDate>
      <link>https://dev.to/chriskiser18/common-sql-injections-to-watch-out-for-4ai3</link>
      <guid>https://dev.to/chriskiser18/common-sql-injections-to-watch-out-for-4ai3</guid>
      <description>&lt;h1&gt;
  
  
  &lt;strong&gt;What is an "Injection"?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;Before we start, we need to know what SQL injection(SQLi) is. SQLi is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. Most commonly it gives these attackers access to information they are not supposed to have, for example, a password. Sometimes this allows attackers to even interfere with the server to perform a DDoS attack. I will briefly write about three types of attacks which include: Retrieving hidden data, Subverting application logic, and Retrieving data from other database tables.&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Retrieving Hidden Data&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;When retrieving hidden data from an unprotected site you can basically change the URL in order to execute an SQL command that you would not want ran through your database.&lt;br&gt;
For example on a website if you are running a SELECT query for some form of data. The attacker would be able to instead run: &lt;/p&gt;

&lt;p&gt;SELECT * FROM &lt;code&gt;tablename&lt;/code&gt; WHERE 1=1&lt;/p&gt;

&lt;p&gt;Which would just give the attacker access to anything in the table being presented.&lt;/p&gt;
&lt;h1&gt;
  
  
  &lt;strong&gt;Subverting application logic&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;With this method, the attackers are able to do something to a website that is unwanted. For example, being able to log into an account with only the username.&lt;/p&gt;

&lt;p&gt;An example statement that would do this is:&lt;/p&gt;

&lt;p&gt;SELECT * FROM users WHERE username = 'administrator'--' AND password = ''&lt;/p&gt;

&lt;p&gt;This would return the user whose username is "administrator" and effectively just log them in with no password.&lt;/p&gt;
&lt;h1&gt;
  
  
  &lt;strong&gt;Retrieving data from other database tables.&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;In cases where the results of an SQL query are returned within the application's responses, the attacker is able to manipulate that in order to make it expose data from other datasets. This is done via the UNION keyword. An attacker could use something along the lines of:&lt;/p&gt;

&lt;p&gt;' UNION SELECT username, password FROM users--&lt;/p&gt;

&lt;p&gt;This would display the username and password from everyone who is located in the user's category.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/tzerwbc3MSA"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;h5&gt;
  
  
  &lt;strong&gt;LINKS&lt;/strong&gt;
&lt;/h5&gt;

&lt;p&gt;&lt;a href="https://www.w3schools.com/sql/sql_injection.asp"&gt;https://www.w3schools.com/sql/sql_injection.asp&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/"&gt;https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/&lt;/a&gt;&lt;br&gt;
&lt;a href="https://portswigger.net/web-security/sql-injection"&gt;https://portswigger.net/web-security/sql-injection&lt;/a&gt;&lt;br&gt;
&lt;a href="https://owasp.org/www-community/attacks/SQL_Injection"&gt;https://owasp.org/www-community/attacks/SQL_Injection&lt;/a&gt;&lt;/p&gt;

</description>
      <category>sqlinjection</category>
      <category>sql</category>
      <category>php</category>
      <category>sqlhack</category>
    </item>
    <item>
      <title>Michigan College is Tracking its Students With a Flawed App -- Is This an Intrusion of Privacy? -- COVID RISK DATA MODELS</title>
      <dc:creator>Chris Kiser</dc:creator>
      <pubDate>Mon, 14 Sep 2020 03:48:16 +0000</pubDate>
      <link>https://dev.to/chriskiser18/michigan-college-is-tracking-its-students-with-a-flawed-app-is-this-an-intrusion-of-privacy-covid-risk-data-models-2cfj</link>
      <guid>https://dev.to/chriskiser18/michigan-college-is-tracking-its-students-with-a-flawed-app-is-this-an-intrusion-of-privacy-covid-risk-data-models-2cfj</guid>
      <description>&lt;p&gt;&lt;a href="https://techcrunch.com/2020/08/19/coronavirus-albion-security-flaws-app/"&gt;Here&lt;/a&gt; is the article!&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Is this Intrusive or Necessary?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;In my opinion, a version of this could be used successfully with not as much intrusion as the current app has. So at its current state, I do believe this is too intrusive. I don't think it is right that the college can know exactly where you are at any point, though I do understand why they are doing it like this, I would not want to be tracked in this way myself.&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Would I Accept this at my College? (Penn State)&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;This question is interesting because I am bound to say yes I would accept it at my college. I feel like it doesn't concern me too much to the point where I would end up leaving Penn State in rebellion to the tracking of data. So yes, I would accept this, would I agree with it completely? No, not at all...&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Is Privacy of data more Valuable than Safety?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;In a sense, the privacy of data is safety. So yes I do think that the privacy of data is more important than a possible outbreak of COVID19, especially when the people being affected would mostly be college students. If there was a data breach and all of this private data got out people could be hurt a lot worse than any other form of harm.&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Envision more ethical ways of solving this issue with tech?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;A more ethical way for this would be to have a couple of different forms of the app. Don't make it mandatory for everyone to use it, you could make it available for people who deem it necessary and have a less intrusive form of testing and tracking for those who feel violated by the original app. &lt;/p&gt;

&lt;p&gt;This "new" app could be just a form of a dashboard, kind of like PSU has. It has all the cases and case numbers for tests distributed but doesn't actually intrude on personal information and privacy.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Extra pictures/videos:&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Below you will find updated COVID tuples and ER Diagrams from my last week's post.&lt;/p&gt;

&lt;h3&gt;
  
  
  COVID Tuples:
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yUKq9miW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/j5t6ouv2uql6zkcqq9om.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yUKq9miW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/j5t6ouv2uql6zkcqq9om.png" alt="Covid Tuples"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Conceptual Risk Factors:
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9CFdO-Bf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jo7h0s0ndxujdu6zo0j0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9CFdO-Bf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jo7h0s0ndxujdu6zo0j0.png" alt="Conceptual Risk Factors"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Physical Risk Factors:
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YJyBXJsI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/1kwwbkc7xvg56h8a6q0f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YJyBXJsI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/1kwwbkc7xvg56h8a6q0f.png" alt="Physical Risk Factors"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Supporting Youtube Video:
&lt;/h3&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/1EXp13cyNho"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>tracking</category>
      <category>app</category>
    </item>
    <item>
      <title>Visualizing COVID Risk Through an ER Diagram</title>
      <dc:creator>Chris Kiser</dc:creator>
      <pubDate>Sun, 06 Sep 2020 20:31:00 +0000</pubDate>
      <link>https://dev.to/chriskiser18/visualizing-covid-risk-through-an-er-diagram-24p5</link>
      <guid>https://dev.to/chriskiser18/visualizing-covid-risk-through-an-er-diagram-24p5</guid>
      <description>&lt;p&gt;Like most things in the world, there are different levels of risk for the current pandemic, depending on what is going on in your life, who you are, and who surrounds you.&lt;/p&gt;

&lt;p&gt;Today I am showing off a couple of data models I created to show what risks you may or may not have to keep in mind during these &lt;em&gt;weird&lt;/em&gt; times.&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;COVID Risk ER Diagram:&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5VRr6Kx5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/re23cuxgmv51h15j0sbe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5VRr6Kx5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/re23cuxgmv51h15j0sbe.png" alt="Untitled Diagram"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;ER Explanation:&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Patient, Hospitals, Geographic Location, Risk, Occupation, Behavior/Hobbies. These are all the things I have decided would be important to look out for when it comes to the risk of COVID. Each of these entities connects in a way that makes it easy to see that if you are relating to many of the attributes (Green ovals) in one of the entities you show a risk even without relating to any of the others.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Example Tuples:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lTEG6iJ7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/fc7b43o7nabngslycczd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lTEG6iJ7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/fc7b43o7nabngslycczd.png" alt="COvid Tuples"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Connecting the Diagram with the Tuple:&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;The ER Diagram directly correlates with the Tuples which will hold the data and information about each subject when data is collected. In theory, there could be an algorithm that takes all the data for each entity and spits out the risk for each subject depending on their personal information.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/sIRhboaKHr8"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;When designing this diagram I had almost the thought of a flowchart in mind, so if you follow the arrows you should be able to self judge your own risks. I tried to make my diagram in a way that I would be able to understand without too much background of the subject, so hopefully, it makes it simple to understand for you in this format.&lt;/p&gt;

</description>
      <category>entityrelationship</category>
      <category>er</category>
      <category>datamodels</category>
      <category>diagram</category>
    </item>
    <item>
      <title>Intro to my Professional Self Via The Differences Between SQL and NoSQL</title>
      <dc:creator>Chris Kiser</dc:creator>
      <pubDate>Sun, 30 Aug 2020 23:29:49 +0000</pubDate>
      <link>https://dev.to/chriskiser18/intro-to-my-professional-self-via-the-differences-between-sql-and-nosql-pke</link>
      <guid>https://dev.to/chriskiser18/intro-to-my-professional-self-via-the-differences-between-sql-and-nosql-pke</guid>
      <description>&lt;h1&gt;
  
  
  &lt;strong&gt;Who am I?&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;&lt;em&gt;Hello, and welcome to my first class assignment for IST 210 at Penn State University!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;As you could probably already tell I am a student attending Pennsylvania State University. I am currently a sophomore studying in IST. My plan is to graduate with a degree in Cybersecurity Analysis and Operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Carrer plans&lt;/strong&gt;&lt;br&gt;
 As of now, I have no clue what I want to do with my degree, but hey I have until 2023 to figure it out... I am however looking for ideas every single day!&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;My Brand&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;currently unknown&lt;/em&gt;&lt;br&gt;
At the time of writing this (my first blog post), I don't currently have a brand name/personality thought of. This is something that I may be seen as for the rest of my life, so I want to take my time and really decide how I want to portray myself as I continue my college career and pursue life. So, for now, I will go by Chris.&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;Differences Between SQL and NoSQL&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;First off, we have to talk about what SQL and NoSQL are:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SQL&lt;/strong&gt; :&lt;br&gt;
The Structured Query Language, or SQL, is a domain-specific language, or DSL, used to interact with relational databases and relational data streams.&lt;br&gt;
&lt;strong&gt;NoSQL&lt;/strong&gt; :&lt;br&gt;
NoSQL is a database that facilitates the storage and retrieval of data. Commonly used for applications that require horizontal scaling, like real-time web applications, it relies on a non-SQL low-level query language to store and retrieve data.&lt;/p&gt;

&lt;p&gt;There are many differences, but to keep my first post not too long I will briefly mention just a couple of main differences.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Amounts of Adoption&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;SQL&lt;/em&gt;: Widely adopted - basis for several popular procedural extensions. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;NoSQL&lt;/em&gt;: Less adopted - Has to do with the limitations NoSQL presents. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ACID Transactions&lt;/strong&gt; &lt;em&gt;(atomicity, consistency, isolation, durability)&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;SQL&lt;/em&gt;: SQL is ideal for situations where databases, regardless of where they sit, need ACID.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;NoSQL&lt;/em&gt;: Not all NoSQL databases have true ACID transactions.&lt;/p&gt;

&lt;h6&gt;
  
  
  &lt;strong&gt;Additional Links:&lt;/strong&gt;
&lt;/h6&gt;

&lt;h6&gt;
  
  
  &lt;a href="https://www.xplenty.com/blog/the-sql-vs-nosql-difference/#:~:text=SQL%20databases%20are%20relational%2C%20NoSQL,dynamic%20schemas%20for%20unstructured%20data.&amp;amp;text=SQL%20databases%20are%20table%20based,graph%20or%20wide%2Dcolumn%20stores."&gt;SQL vs NoSQL&lt;/a&gt;
&lt;/h6&gt;

&lt;h6&gt;
  
  
  &lt;a href="https://www.youtube.com/watch?v=teTqVAZ1VMU"&gt;Youtube Video SQL vs NoSQL&lt;/a&gt;
&lt;/h6&gt;

&lt;h6&gt;
  
  
  &lt;a href="https://blog.yugabyte.com/a-primer-on-acid-transactions/"&gt;What is ACID?&lt;/a&gt;
&lt;/h6&gt;

</description>
      <category>sql</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
