Discussion
The information technology (IT) team has created a production Web application with a select amount of users that are using it. You are in the processing of creating a security database audit that includes several concentrations such as server maintenance, account administration, access control, data privileges, passwords, encryption, and activity. Complete the following:
• Describe each concentration, and list 3 audit checks for each.
• Using the activity concentration, explain how you can identify a security breach during the database security audit.
2 pages
References.