Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • About Us
  • Activities
    • Conferences
    • Courses
    • Seminars
    • Students Activities
    • Webinars
    • Workshops
  • Events
  • News
    • Political
    • Economic
    • Business
    • Technology
    • Culture
  • Publications
  • GALLERY
  • Archive
  • CONTACT US
No Result
View All Result
  • Home
  • About Us
  • Activities
    • Conferences
    • Courses
    • Seminars
    • Students Activities
    • Webinars
    • Workshops
  • Events
  • News
    • Political
    • Economic
    • Business
    • Technology
    • Culture
  • Publications
  • GALLERY
  • Archive
  • CONTACT US
No Result
View All Result
Consulting and Research Center
No Result
View All Result

Database Security and Authentication

Dr. Bazeer Ahamed

Share on FacebookShare on Twitter

Department of Computer Science at Cihan University – Duhok, held an international online workshop on the Google Meet platform entitled “Database Security and Authentication”.

🎙️Hosted by the speaker:
📌 Dr. Bazeer Ahamed: Lecturer in the Department of Information Technology University of Technology And Applied Sciences Al Musanna Sultanate of Oman

🎙️Session Moderator
📌Mr. Bilal Hikmat Rasheed: Head of Computer Science Department Cihan University – Duhok.

Talk about:

Database security refers to the range of tools, controls, and measures designed to establish and preserve database confidentiality, integrity, and availability. This article will focus primarily on confidentiality since it’s the element that’s compromised in most data breaches.

Windows authentication requires a user to first authenticate to Windows with their login and password. Once a user has been authenticated to Windows, they can then connect to SQL Server using Windows authentication. That is, provided their Windows account has been granted access to SQL Server via a login (more on logins later). Windows authentication is tightly coupled with Windows Security and is also known as Integrated Security. Windows authentication works great when a person is part of a Windows domain.

 

At the end of the session, many questions and scientific interventions were raised by attendance.

 

 

 

Tags: 2023-2024
Next Post
In view of preparation of COP 28 :Methods & Frameworks to Analyses Poverty and environment issues

In view of preparation of COP 28 :Methods & Frameworks to Analyses Poverty and environment issues

Please login to join discussion

Recommended.

The Future of Iraqi Economy in Light of the Current Crises

The Future of Iraqi Economy in Light of the Current Crises

In view of preparation of COP 28 :Methods & Frameworks to Analyses Poverty and environment issues

In view of preparation of COP 28 :Methods & Frameworks to Analyses Poverty and environment issues

Trending.

The Implications of U.S. Tariffs on the Global Economy

The Implications of U.S. Tariffs on the Global Economy

The importance of Web of Science (Clarivate) to researchers

The importance of Web of Science (Clarivate) to researchers

Global Economy & Geopolitical Changes

Global Economy & Geopolitical Changes

Law of Preventing Misuse of Communication Devices in the Iraqi Kurdistan Region No. 6 of the year 2008

Law of Preventing Misuse of Communication Devices in the Iraqi Kurdistan Region No. 6 of the year 2008

Second Annual Book Fair 2024

Second Annual Book Fair 2024

Facebook Twitter LinkedIn Youtube
Cihan University - Duhok
Consulting & Research Center

Copyright All Right Reserved 2022 Cihan University - Duhok

Developed by ICT Dep.

No Result
View All Result
  • Home
  • About Us
  • Activities
    • Conferences
    • Courses
    • Seminars
    • Students Activities
    • Webinars
    • Workshops
  • Events
  • News
    • Political
    • Economic
    • Business
    • Technology
    • Culture
  • Publications
  • GALLERY
  • Archive
  • CONTACT US

© 2022 CRC - Consulting & Research Center Developed by ICT Dep. Cihan University - Duhok.