After completing this chapter, students will be able to: Introduction to database security, discretionary access control (DAC), mandatory access control (MAC), role-based access control (RBAC), encryption & public key infrastructure (PKI), common attacks on databases, SQL injection, challenges of database security. | Lecture Database Systems - Lecture 17