In the aftermath of a security incident where unauthorized commands accessed sensitive records, an organization is determining the best way to enhance their database transaction methodologies to reduce future exploitation. What modification can the development team make to the way the application communicates with the back-end data system to improve security?
Place command instructions in external files that the application retrieves to execute operations
Rearrange the database schema to align more closely with company data handling procedures
Include command strings directly inside the application's source to streamline operations
Incorporate the use of pre-compiled routines within the backend database environment