Skip to main content

What are the different types of database security?

Introduction to the computer system and database related topic and the topic is following below here:


What are the different types of database security?


Let's discuss the computer system and database related topic is mentioned above and the explained following below here:


What are the different types of database security?

There are some points on the computer system and database security related topic of "What are the different types of database security?" following below here:


  • Database secured when the user apply the block all option to manipulate and only can see the database
  • Database login system protect password on database file
  • Database integration is a process of collecting information from other database file and combine the complete information about the particular object or subject
  • Database secured from unique identification using particular hardware resource


Let's discuss these points listed above about the computer system and database security related topic of "What are the different types of database security?" explanation following below here:


Database secured when the user apply the block all option to manipulate and only can see the database

Database is secured when the user applies the blocks to all the options to manipulate and only can see the database, which means the user can block the options which are used to manipulate the database stored into the memory of the storage device. The manipulation is the process of the editing work on the record and its attributes on the database. The manipulation query applies on the record according to the primary key to address the record to change or manipulate from the database file.

The database file contains the records and the queries are used to manipulate such as insert, delete, update etc. These are the manipulation queries which are used to change the data from the database file on the database applications software.


Database login system protect password on database file

Database login system protects password on database file, that means the login system protects the database applications software because the application of the database access the database files from the storage device of the computer system which is stored in the memory of the storage device, the database file.

The login system contains two types of properties such as username and password, username, password and robot captcha image.

This type of verification is used to protect the database of the database applications software.

Username cannot be verified when the password is wrong, enter into the login system interface. Similarly the robot captcha is also verified when the human can do the activities on the login system on the database applications software.


Database integration is a process of collecting information from other database file and combine the complete information about the particular object or subject

Database integration is a process of collecting information from other database file and combine the complete information about the particular object or subject that means that means the integration on the database records the collection of the record which contains some attributes and it is combined with the complete information about the particular object or subject is connected to the other database stored the information about the same particular records of the object or subject.

Some databases contain half record information with their attributes stored on the particular database and it is known as the distributed records on the database files. The integration is the process of the collection that records information about the object or subject after integration of the database using the relational or strong attributes of the database. 


Database secured from unique identification using particular hardware resource

Database secured from unique identification using a particular hardware resource that means the unique identification of the database is stored into the memory of a computer system storage device to verify the particular data from the database is recognised using the hardware devices or resource. Such as a fingerprint machine to verify the particular person's verification to access the database of the particular organisation because it is a sensitive database contained within the organisation setup. 

The sensitive database is necessary to protect from the other because the organisation needs to secure their database from the other user who can misuse the database stored into the memory of the computer system storage device.

Comments

Popular posts from this blog

Discuss the role played by the various components of the CPU

Q Discuss the roles played by the various components of CPU? The CPU is the brain of the computer system. All major calculations, manipulations and comparisons are made by the CPU. The CPU is also responsible for activating and controlling the operations performed by all other units of the computer system. The major components of the CPU are: a) Arithmetic Logic Unit (A.L.U.) b) Control Unit (CU) c) Primary Memory Arithmetic Logic Unit (A.L.U.): What is ALU Arithmetic logic Unit? ALU is a part of the CPU. It is a part to calculate the logical term in the CPU where the term refers to an operation of logical type. It also calculates the arithmetic terms in the CPU where the term refers to an operation of arithmetic type. It is used to direct access through the processor controller. The ALU connected to the input and output peripheral system through the bus with the different types of bus. Such as control bus, data bus etc. ALU is a part of the CPU that can calculate the input

About the memory and its Classification of the computer Memory

What are the memories in the reference of computer system? What is Computer Memory?:- The memory is the essential for the computer to store the data, instruction and information. Without memory, computers are not be able to store data, instruction etc. The memory is an essential part of a computer system. It is require by the computer system to store information. Memory can be divided into the following two categories types: i) Primary or Main memory ii) Secondary Memory or Permanent memory In this figure I'll show the classification of the memory of computer system peripheral and architecture of organisations Primary Memory or Main memory:- i) Primary memory is the memory which is fastest memory of the computer. ii) It is a small but relatively fast storage unit that stores data and instruction which are used by the CPU (central processing unit). iii) This type or category of a memory is the main memory of the computer.It is a temporary memory and also we

What are the three main purpose of an operating system?

What are the three main purpose of an operating system? There are three main purpose of an operating system. 1. The first main purpose is User interface between hardware and users. 2. The second main purpose is to operate the internal parts of the computer properly and systematically using binary code system in the form of 0 and 1. 3. The third main purpose is to provide an environment for development of an application software and program to uses the hardware resources of the computer and connected to the computer parts which provides output to the user, the output from application software is very useful for users. Interface between user and hardware device  The operating system uses all types of interface such as command line interface, batch command interface and Graphical User Interface to interact with users to hardware peripheral devices through the monitor screen. Monitor has a big role making interface between hardware and users. Monitor visualization of all types of o