Syllabus
Schedule
Reading
Discussion
Project
Test
Resource
Tip

Syllabus

Instructor: Peter Ping Liu, Professor, Ph D, PE, OCP, CQE and CSTM
Office:

4032 (304D) Klehm Hall
11:00 AM- 12:00 PM, Monday through Friday

This is the best time to see your instructor to discuss any problems, questions or concerns.

Phone:

(217)581-6267 (with voice mail)

Email: Please use the email utility within WebCT/Blackboard to communicate with the instructor regarding any issues on this course.
Instant Messenger (IM):

User ID: peter_ping_liu
IM: Yahoo Messenger

During my office hour, I use Yahoo messenger to chat with students who do not reside in Charleston. If you live in Charleston, please see me in my office.

Course Description

Study of principles and practices of implementing computer database security in modern businesses and industries, including database security principles, database auditing, security implementation and database reliability.

Credit: 2-2-3
Prerequisite:

Official:

  1. TEC 5323 Advanced Database Technology, or equivalent (basic understanding on Oracle SQL and SQL script).
  2. You need a high performance computer that can run Oracle database Enterprise Edition (9i, 10g or 11g).


Unofficial: Willingness to have fun and contribute to the class.

Learning Objectives:
  1. Demonstrate understanding of current database technology and typical database products.
  2. Demonstrate understanding of security architecture in modern computer systems in a typical enterprise.
  3. Formulate a working definition of database security and administration.
  4. Identify contemporary practices of operating system security.
  5. Demonstrate the knowledge and skills for administration of user, profiles, password policies, privileges and roles.
  6. Manage database security on application level.
  7. Conduct database auditing for security and reliability.
  8. Implement typical security projects on enterprise systems.

Readings:

Text: You are required to read the entire textbook assigned for this course, as follows:

Hassan A. Afyouni, Database Security and Auditing: Protecting Data Integrity and Accessibility, Thomson Course Technology (c2006)

Course Outline:

•  Introduction: Security issues faced by enterprises

•  Installing a typical database product

•  Security architecture

•  Operating system security principles

•  Administration of users

•  Profiles, password policies, privileges and roles

•  Database application security models

•  Database auditing models

•  Application data auditing

•  Practices of database auditing

Performance Assessment:

Student achievement will be assessed and grades will be given according to class participation and contribution (including weekly discussion, and weekly "community solutions"), database security project, mid-term test and final project. Grades will be determined upon the following distribution:

Class participation/Weekly Discussion: 15%
Class Contribution/Weekly Community Solutions: 10%
Database lab security projects and reports 50%
Mid-term test 10%
Final project 15%

Individual grade is based on the total score using the following scale: 

Total >= 90
A
80 <= Total <90
B
70 <= Total < 80
C
60 <=Total < 70
D
Total< 60
F
ADA Statement:                     If you have a documented disability and wish to receive academic accommodations, please contact the Coordinator of the Office of Disability Services (581-6583) as soon as possible.
Unofficial Statement: Having fun is part of human nature. Go for it.