You do not have to write an intro, just the body of the outline. Using APA format, create an outline (headers and 1-2 sentence description of content) for your paper. Make sure you pull info as your citations' plan from your annotated bibliography. Submit an attachment to this assignment. Please write outline in relation to this draft Intro: Database Security: common vulnerabilities and countermeasures. Database security is crucial as the use of the technology expands tremendously. Organizations have always used some version of databases since the early stage of computer systems. In the last decade, the use of the technology has increased tremendously due to the proliferation of data which consequently increased the requirement for effective data storage, management, access, query, and security. Most organizations have digitized their physical file systems and the ways we utilize IT systems such as video streaming and social media are some of the significant factors for increasing data size. Organizations ought to develop and implement policies and solutions to mitigate the risks and eliminate the threats against their customer’s sensitive data and proprietary data. Information assets are vital for the survival of most companies, data breaches can have tremendous monetary and reputational costs on their victims. It’s always vitall to assess the current vulnerabilities of any technology in order to address them before they can be exploited by criminals. Use the references listed below. References Awadallah, R., & Samsudin, A. (2021). Using Blockchain in Cloud Computing to Enhance Relational Database Security. IEEE, 9, 1-14. 10.1109/ACCESS.2021.3117733 Aziz, M. M., & Ahmed, D. R. (2015). Proposed Method to Prevent SQL Injection Attack. Networks Security & Distributed Systems, 59-63. Bu, M., Jin, X., Chen, W., Cheng, J., Geng, S., & Hao, J. (2020). Design of standard security measures database for various types of maintenance operations. Earth and Environmental Science. doi:10.1088/1755-1315/551/1/012010 Research and Application of Web Database. (2013). Trans Tech Publications, 380-384, 2306-2311. https://doi.org/10.4028/www.scientific.net/AMM.380-384.2306 Teimoor, R. A. (2021, Jul). A Review of Database Security Concepts, Risks, and Problems. UHD Journal of Science and Technology, 5(2), 38-46.