Skip to main content

What are the 2 types of security being applied to a database?

Introduction to the computer system related topic and the topic is following below here:


What are the 2 types of security being applied to a database?


Let's discuss the computer system related topic is mentioned above and the explained following below here:


What are the 2 types of security being applied to a database?

There are some points on the computer system and database security technology related topic of "What are the 2 types of security being applied to a database?" following below here:


There are two types security method that applied on the database following below here:


  • Low level security such as basic login system 
  • Login system have two types are 
  • username and password
  • Username and two password with robot captcha
  • High level security contain verification confirmation with another key to login the database
  • Using third party site to confirmation the login user on the database


Let's discuss these points listed above about the computer system and database security technology related topic of "What are the 2 types of security being applied to a database?" explanation following below here:


There are two types security method that applied on the database following below here:


Low level security such as basic login system 

Low level security means the security is to protect the database file through the interface of two verification only which is known as login name or user name and password or security key of username.


Low level security such as basic login system

These types of security are common to all security processes on the database security method.

These types of low security methods can be hacked, cracked, and attacked by the cybercriminals to steal the information from the database file by breaking the application software of the database.


Login system have two types are 

username and password

Username is used to provide the interface to enter the user's identification name into the text box and password means to enter the secret security key into the text box of password for verification of the account user using the method of the login system on the database application software.


Username and two password with robot captcha

Username and two passwords are necessary to enter otherwise the account user cannot access the database application to open their database and cannot access without the two password system and username on the database. 

The robot captcha is verification of robot vs human because some robots access the account of the particular user.

In this process the robot captures the process of verification by using the image data to verify by manual process and only can understand their logical questions or pattern drawn at the image data. The human user only can point out the right data from the image data on the robot captcha process of verification.


High level security contain verification confirmation with another key to login the database

High level security contains verification and confirmation methods using the third party sites or devices which are used to verify the account of the user on the database application software to access the database file and their personal database.

High level security increases the security layer on the account of the particular site or portal where the user wants to increase their security on the account on the particular site or portal.

The high level security on the account of a particular site or portal needs these users who have a business account on the particular site or portal because these accounts can be connected to the bank account details or other types of money earning site etc.


Using third party site to confirmation the login user on the database

Using a third party site to confirm the login system of the account user on the database application software using the confirmation system process over the login interface.

That means the third party site is used to confirm the login account by sending the verification code to their server and they receive it to provide to the account of the user and the user can access their account on the third party site to get the code for verification of their account of database application software to open their to access their account on the database server and verify the security process and complete it.

It is a manual process of verification because the manual process is only completed by the genuine user when the user needs to make their account more secure from the other unknown user who wants to access their account.

Comments

Popular posts from this blog

Discuss the role played by the various components of the CPU

Q Discuss the roles played by the various components of CPU? The CPU is the brain of the computer system. All major calculations, manipulations and comparisons are made by the CPU. The CPU is also responsible for activating and controlling the operations performed by all other units of the computer system. The major components of the CPU are: a) Arithmetic Logic Unit (A.L.U.) b) Control Unit (CU) c) Primary Memory Arithmetic Logic Unit (A.L.U.): What is ALU Arithmetic logic Unit? ALU is a part of the CPU. It is a part to calculate the logical term in the CPU where the term refers to an operation of logical type. It also calculates the arithmetic terms in the CPU where the term refers to an operation of arithmetic type. It is used to direct access through the processor controller. The ALU connected to the input and output peripheral system through the bus with the different types of bus. Such as control bus, data bus etc. ALU is a part of the CPU that can calculate the input...

About the memory and its Classification of the computer Memory

What are the memories in the reference of computer system? What is Computer Memory?:- The memory is the essential for the computer to store the data, instruction and information. Without memory, computers are not be able to store data, instruction etc. The memory is an essential part of a computer system. It is require by the computer system to store information. Memory can be divided into the following two categories types: i) Primary or Main memory ii) Secondary Memory or Permanent memory In this figure I'll show the classification of the memory of computer system peripheral and architecture of organisations Primary Memory or Main memory:- i) Primary memory is the memory which is fastest memory of the computer. ii) It is a small but relatively fast storage unit that stores data and instruction which are used by the CPU (central processing unit). iii) This type or category of a memory is the main memory of the computer.It is a temporary memory and also we ...

What are the three main purpose of an operating system?

What are the three main purpose of an operating system? There are three main purpose of an operating system. 1. The first main purpose is User interface between hardware and users. 2. The second main purpose is to operate the internal parts of the computer properly and systematically using binary code system in the form of 0 and 1. 3. The third main purpose is to provide an environment for development of an application software and program to uses the hardware resources of the computer and connected to the computer parts which provides output to the user, the output from application software is very useful for users. Interface between user and hardware device  The operating system uses all types of interface such as command line interface, batch command interface and Graphical User Interface to interact with users to hardware peripheral devices through the monitor screen. Monitor has a big role making interface between hardware and users. Monitor visualization of all types ...