Database Security: Top Threats and 6 Critical Defenses