This document discusses database security. It covers access protection through user accounts and audits. It also describes different access control methods like discretionary access control, mandatory access control and role-based access control. Discretionary access control allows owners to grant and revoke access to objects. Mandatory access control assigns security levels and clearances to subjects and objects. The document also briefly mentions encryption and inference control for database protection.