Hints:

This screen lists a few common security options that are applied to an object.  The attack trees can be analyzed and simple ‘what if’ games can be played to better understand security risks (click on for more information).

Tree Analysis Through Game Playing

  

Your Settings
Strong Password  No   Yes  
Restricted access to root password/ID  No   Yes  
Updates and patches applied to reduce weaknesses in OS  No   Yes  
Intruder cannot sniff id/pw due to encrypted traffic on wirless or wired path  No   Yes  
Remote DB Administration is restricted  No   Yes  
DB backup files are placed in a secure site  No   Yes  
Database Authorization properly enforced at DBMS level  No   Yes  
Audit Trails applied  No   Yes  
DB is not directly accessible from the internet  No   Yes  
More Hints:

You can select the security settings for your object here. please specify from listed settings which of these are applied and click on ‘Submit’ to see how the settings enable/disable some attacks. It will be seen that, in some cases, ignoring one security setting (for example, not putting password) can enable many different types of attacks.