I'm raising this question to seek help for my final uni project which is an in-depth look at security between the two and how they use authentication methods to provide security for both users and databases.
I'm researching into this subject myself, but if anyone can point me to other resources that would be also helpful