Why databases need security

An unsecured database has numerous vulnerabilities to different kinds of threats.

This section does not provide a complete list of these vulnerabilities and threats. No survey of security concerns can hope to be complete. However, this section attempts to list the major vulnerabilities and threats known today.

The remainder of this guide describes how you can combat these threats.

Related concepts
Defenses against security threats
Defenses mapped to threats
Designing safer Derby applications
Security terminology