How an unauthorized user can trick an authorized user into disclosing sensitive data.
An unauthorized user creates a new relation for storing sensitive data.
An unauthorized user give access privileges to an authorized user without his knowledge.
An unauthorized user alters some application programs that the authorized user uses to include some hidden instructions
The hidden instructions will copy sensitive data from the relation (containing sensitive data) that only the authorized user has access to, into the new relation created by the unauthorized user.
Then, after obtaining sensitive data, the unauthorized user alters the application programs back to the original form