TEC 5363 Database Security

Syllabus
Schedule
Reading
Discussion
Project
Test
Resource
Tip

Learning Objectives of
Chapter 5 Database Application Security Models

Upon completion of this chapter, you should be able to:

  1. Describe the different types of users in a database environment and the distinct purpose of each
  2. Identify and explain the concepts of five security models
  3. List the most commonly used application types
  4. Implement the most common application security models
  5. Understand the user of data encryption within database applications.