1. Explain the necessity of defining processing rights and responsibilities. How are such responsibilities enforced?
2. Explain the relationships of users, groups, permission, and objects for a generic database security system.
3. Describe the advantages and disadvantages of DBMS-provided security.
4. Describe the advantages and disadvantages of application-provided security.