Level 2. Page 643 in your COMPTIA's Linux + book.
C2 level security.
Document security is the process of ensuring the a document is correctly marked as to the level of security required for the information it contains, and that it receives that level of security.
4
The Infocon level, short for "Information Operations Condition," is a system used by the U.S. Department of Homeland Security to indicate the current threat level to information systems and networks. It ranges from Level 1 (Low) to Level 5 (Severe), with each level corresponding to the severity of the threat and the recommended actions for organizations to mitigate risks. The Infocon levels help guide organizations in implementing appropriate security measures and responses to protect against potential cyber threats.
Medium-Security Level
Medium-Security Level
C2 level security provides for:Discretionary Access ControlIdentification and AuthenticationAuditingResource reuse
System security is OS level security like you have username password to logon on your system. Database security is db level security governed by your database software.like you have different schemas that have different passwords.You can decide grants and permissions for various db objects based on these db level users.
user level security
security policy
What are the steps followed when using testing at security level in ERB?
Share-level and User-level security is actually in the category of computers. In share-Level security systems, passwords are associated with specific objects, not with users. ex. Windows XP User-Level security is the most flexible and secure method of protecting the sensitive data, code, and design of objects in an Access database. User-Level security is for if you need more control. ex. To prevent users from modifying the design of your tables and queries.