This section discusses responses to various kinds of security threats to the DBMS. For more information on various roles, see Administrative Roles and Role Separation.