Examine any DBMS used by your organization and identify the security measures provided

Examine any DBMS used by your organization and identify the security measures provided