Threats to unsecured databases

A threat is potential damage caused by an attacker using a technique to exploit a vulnerability. We have already seen examples of Derby vulnerabilities. Examples of damages, attackers, and techniques follow.

Significant damages include the following.

Attackers include the following.

Techniques of attack include the following.

Related concepts
Vulnerabilities of unsecured databases