In this chapter we'll discuss general security issues you should consider when running MySQL. Although we cannot be comprehensive in the space of a single chapter, we will give you a list of the most important don'ts. We will cover the following:
How the privilege system works in practice
Securing accounts
Securing your installation files
Filtering user data
Other tips