As the following users and using SQL perform the requested tasks:
Employee_User
Login
Select All Columns and All Rows from Corporate Directory
Logoff
Manager_Support
Login
Select All Columns and All Rows from Employees
Select All Columns and All Rows from Job_History
Logoff
Manager_Support
Login
Delete Emplpyee 57
Logoff
Manager_Manager
Login
Delete Job Named 'MKT_CLERK'
Logoff
HR_User
Login
Logoff
HR_Support
Login
Select All Columns and All Rows from Manager_Information
Delete Employee 126
Logoff
HR_Manager
Login
Select Employee 156
Select Job 'EXEC_VP'
Delete the Country France
Logoff
PART TWO
1. Generate a report of which users or roles have what Table/View Permissions in the Database
2. Generate a report of which system privileges the Users have in the Database
3. Generate a report showing who logged in and out of the database including times
4. Generate a report showing which user performed SELECT/INSERT/UPDATE/DELETE against the tables, and if it succeeded or not.
Add the discussion about the attack framework, the description the types of hackers and the definitions to the section titled: Auditing Policies.