Labels:text | poster | screenshot OCR: Master Security Tables Network Security Processor 1 Processor 2. Operating System Operating System Databaser. Database 1 Database New User Database n Password FIGURE 4 The first and most common approach approach to distributed data- base security implements a common security system such as the one shown here. This security system maintains a single password, and controls access to all of the system components.