Part One: Introduction to database security
This part of the manual provides a conceptual introduction to database security.
Why databases need security
An unsecured database has numerous vulnerabilities to different kinds of threats.
Defenses against security threats
Defenses against threats can be divided into two categories.
Defenses mapped to threats
The following table maps defenses to examples of threats that they parry.
Designing safer Derby applications
The following tips should help you write and deploy safer applications that use Derby.
Security terminology
In discussing Derby defenses, the following terms are useful.