. . "If a highly-privileged account logs on to the server, such as the applications administrator, the attacker quickly gains permissions to the application data." . . .