2. Privilege Abuse
Users may abuse legitimate database privileges for unauthorized purposes. Consider an internal healthcare application used to view
individual patient records via a custom web interface. The web application normally limits users to viewing an individual patient’s
healthcare history – multiple patient records cannot be viewed simultaneously and electronic copies are not allowed. However, a rogue
user might be able to circumvent these restrictions by connecting to the database using an alternative client such as MS-Excel. Using
Excel and their legitimate login credentials, the user could retrieve and save all patient records to their laptop. Once patient records
reach a client machine, the data then becomes susceptible to a wide variety of possible breach scenarios.