Vyjmenovává a rozebírá je Ericka Chickowski:
- Leaving Database Unpatched
- Not Seeking Out Rogue Databases
- Granting Excessive Privileges
- Allowing Default Username/Passwords
- Failing To Self-Examine
- Allowing Arbitrary Internet Connections And Input
- Failing To Encrypt