Return to Article Details A Study on Handling of Distributed Database Security Threats