Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities.
Best practices for preventing SQL injection attacks on the network.
What applications are mapped to the database, and are they the correct ones?
The next step is to continuously monitor what is going on between your application and the database.