– Evaluate the various SQL injection techniques security professionals should be familiar with in order to prepare them to keep that data safe.- What are some of the common techniques used for extracting information from a SQL Server?- Implement the steps for performing SQL Injection techniques.- How can you prevent SQL Injection in Oracle?Deliverables: Your paper should be 4-5 pages in length, not including the title and reference pages.You must include a minimum of two credible sources and information from the module to support your writing.Your paper must follow academic writing standards and APA style guidelines, as appropriate.