Bad things happen—accidentally and on purpose—and we want to protect our MariaDB database against both. Threats come in many different forms and come from many different places including—but not limited to—physical threats, filesystem threats, network threats, and user threats.
You can think of the data in your database as being at the center of a set of rings as illustrated by the following diagram:
The outermost ring is the Internet . This is the outside world. If we are running a business this is where our customers are. It's also where many attacks originate.
The next two rings are our Internal Network and the Building ...