1. Identify possible threats internal or external to a database that may affect the following components of a database system.
a. Hardware
b. Communication
c. DBMS and application software
d. Database
e. User/ Operators
f. Programmers
g. Database Administrators
2. Describe how SQL injections may be used to comprise a database and countermeasures.
3. Describe entity framework and its application in design of database
4. Compare the security features implemented in the following
a. DBMS
b. MS Access
c. MySQL
5. Compare the database recovery features implemented in;
a. DBMS
b. MS Access
c. MySQL