Skip to main content

Computer security system and What happens when a computer is augmented with a security system?

What happens when a computer is augmented with a security system?

The computer system is a complex device and electronic machines that provide the computed value to the user on the output device.

Here the computer system has a logical system which is known as a security interface for the end user when the user accesses the computer operating system.

The user can access their account on the operating system when the user verifies the details which had the user saved to verify when the user accesses their account on the operating system on the computer.

When the user access they can increases the security system on the computer on the operating system that means it secured their database in the high security feature such as eye scanned database verification, finger pattern database verification, whole hand patter scan database verification to verify the user is matched their database to access their account on the operating system on the computer.


Introduction to the computer system related topic of computer security system and the question is below here:


What happens when a computer is augmented with a security system?


Let's discuss the computer security system related topic of "What happens when a computer is augmented with a security system?" explained below here:


In this topic the user has to learn about the computer system security increases and its reasons.

The user can access the computer system through their account that has been created on the particular operating system on the computer system.

The account need to verify the username and password or only used if you have created only one account on the operating system on the computer.

The password must be in the alphabets and numerical data with some special characters that some user allow to verify the password during the login system of the operating system on the computer.

The login system mostly contained the username and password system to verify but some option was provided to the user to verify the image portion clicking system where the user selects to click then verify the image data and then the operating system allows access to the account on the operating system on the computer system.



In this image shows the diagram of operating system security for the account user on the operating system on the computer to access their account using the security passing through showing the interface as above in the diagram. Computer security system and What happens when a computer is augmented with a security system?
In this image shows the diagram of operating system security for the account user on the operating system on the computer to access their account using the security passing through showing the interface as above in the diagram.

For example:- If you have a username like sam_age and the password is '1gj75&@io' which is the most strong password to login and verify the password in the login system on the operating system on the computer. Where the user can guess the password, crack the account login of any user they have an idea and analysis of activities etc. To crack the password but this is the strong password that cannot be guessed by the other.


What happens when a computer is augmented with a security system?

There are some points on the computer system and security of computers related to the topic of "What happens when a computer is augmented with a security system?" following below here:


  • It increases the security on the computer system account user on database of computer
  • It is difficult to access if the user forgotten their security code in the account of operating system
  • Network security also can protect the data from the unknown access of user
  • Database of storage device is protected by the features of operating system


Let's discuss the points above about the computer system and security feature of computer related to the topic of "What happens when a computer is augmented with a security system?" explanation following below here:


It increases the security on the computer system account user on  database of computer

Account user on the operating system is a protection setup on the computer system which protects from the unknown user who can access without a security layer applied on the operating system to operate the computer system.


In the image shows the account user n allow to access their account through password verification by the operating system. It increases the security on the computer system account user on  database of computer
In the image shows the account user n allow to access their account through password verification by the operating system.


The account needs mostly two types of attributes such as username and password to access the account which is created in the operating system database on the computer system.

The operating system is used to provide the option to make an account on the operating system or system software to access the user using their account on the computer system to operate the computer system and database which has been stored in the storage device of the computer system.


It is difficult to access if the user forgotten their security code in the account of operating system

It is difficult to access if the user forgot their security code in the account of the operating system. That means there is a rare chance to access the operating system if the security code is forgotten because the operating system is not currently online to access with the internet service on the computer system.

The forgotten option is mostly worked in the online service of computer systems and can recover the password data of the account of a particular user on the operating system on the computer system.

The account user can access to open the operating system in safe mode which mostly all operating systems provide for emergencies to break the password offline method on the computer system.


Network security also can protect the data from the unknown access of user

Network security also can protect the data from the unknown access of the user that means the network security is used to protect the database which is currently used on the transmission of the data in the network architecture or model on the wide area, local area, metropolitan area etc. According to the range of the computer network system to share the database in the network model for a specific purpose of the department.


In this image shows the diagram of computer network system that need to accessed by the client user through the security interface as shown above in the diagram. Network security also can protect the data from the unknown access of user
In this image shows the diagram of computer network system that need to accessed by the client user through the security interface as shown above in the diagram.


Every department has different types of databases which are sensitive to sharing and need to study about the database. So it is necessary to protect from the other user who cannot access the database such as object based file, relational based files, flats files etc.


Database of storage device is protected by the features of operating system

On the database security is applied using the control language command of the database query language on the relational database model. In the memory storage device of the computer system the operating system also provides the security feature to protect the object based file on the computer of the user who can protect their database which has been in the memory of the permanent storage device of the computer system.


In the image shows diagram of the database which is secured by the operating system feature.
In the image shows diagram of the database which is secured by the operating system feature.

The operating system provides the folder to secure the file which is contained in the folder and applies the feature of the password to open the document.

Similarly, folders have also applied the feature to open a folder after the verification of the password is right to access and confirm the password.

Comments

Popular posts from this blog

Discuss the role played by the various components of the CPU

Q Discuss the roles played by the various components of CPU? The CPU is the brain of the computer system. All major calculations, manipulations and comparisons are made by the CPU. The CPU is also responsible for activating and controlling the operations performed by all other units of the computer system. The major components of the CPU are: a) Arithmetic Logic Unit (A.L.U.) b) Control Unit (CU) c) Primary Memory Arithmetic Logic Unit (A.L.U.): What is ALU Arithmetic logic Unit? ALU is a part of the CPU. It is a part to calculate the logical term in the CPU where the term refers to an operation of logical type. It also calculates the arithmetic terms in the CPU where the term refers to an operation of arithmetic type. It is used to direct access through the processor controller. The ALU connected to the input and output peripheral system through the bus with the different types of bus. Such as control bus, data bus etc. ALU is a part of the CPU that can calculate the input...

About the memory and its Classification of the computer Memory

What are the memories in the reference of computer system? What is Computer Memory?:- The memory is the essential for the computer to store the data, instruction and information. Without memory, computers are not be able to store data, instruction etc. The memory is an essential part of a computer system. It is require by the computer system to store information. Memory can be divided into the following two categories types: i) Primary or Main memory ii) Secondary Memory or Permanent memory In this figure I'll show the classification of the memory of computer system peripheral and architecture of organisations Primary Memory or Main memory:- i) Primary memory is the memory which is fastest memory of the computer. ii) It is a small but relatively fast storage unit that stores data and instruction which are used by the CPU (central processing unit). iii) This type or category of a memory is the main memory of the computer.It is a temporary memory and also we ...

What are the three main purpose of an operating system?

What are the three main purpose of an operating system? There are three main purpose of an operating system. 1. The first main purpose is User interface between hardware and users. 2. The second main purpose is to operate the internal parts of the computer properly and systematically using binary code system in the form of 0 and 1. 3. The third main purpose is to provide an environment for development of an application software and program to uses the hardware resources of the computer and connected to the computer parts which provides output to the user, the output from application software is very useful for users. Interface between user and hardware device  The operating system uses all types of interface such as command line interface, batch command interface and Graphical User Interface to interact with users to hardware peripheral devices through the monitor screen. Monitor has a big role making interface between hardware and users. Monitor visualization of all types ...