Network Security
  • Illegitimate access to database server
  • Misconfiguration in network
  • Risk from "bring-your-own-device" (BYOD) policies