Security Practices

When granting privileges on the schema objects that comprise your application, use the principle of least privilege.

That is, users and middle tiers should be given the fewest privileges necessary to perform their actions, to reduce the danger of inadvertent or malicious unauthorized activities.

See Also:Using Bind Variables to Improve Scalability” for information about using bind variables instead of string literals, which is the most effective way to make your code invulnerable to SQL injection attacks