Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database. Classify each vulnerability with being technical, managerial, cultural, or procedural. Provide your rationale.
Suggest specific actions that could be performed to minimize the vulnerabilities identified in Question 1 of this discussion. Describe how often these measures should be performed and the order in which each should be performed.