The database system consists of several components that can be located on different computers and in different networks. Data is transferred between these components as well as between database system and database application (for example an SAP system).
Data is intercepted
Unauthorized persons intercept data while it is being transferred between computers.
Unauthorized access to the database computer via the network
Unauthorized persons exploit security gaps in other programs in order to gain access to the database computer via a network connection.