Upon completion of this chapter, you should be able to:
- Describe the different types of users in a database environment and the distinct purpose of each
- Identify and explain the concepts of five security models
- List the most commonly used application types
- Implement the most common application security models
- Understand the user of data encryption within database applications.