In: Computer Science
Using the SQL for Dummies textbook in the CSU Online Library, refer to Table 3-4 “Types of Protection” on page 74 to create three scenarios in which the use of protection operations are used to secure a database. Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.
Your paper should be three pages in length. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines.