This paper covers various ways databases are attacked, and how to prevent them from being "hacked".