Seeing the table attches create three scenarios in which the use of protection operations are used to secure a database. Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.
Your paper should be three pages in length. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines
I have attached a sample work (securing database.docx)
The image is the table needed for the work