Instructor: |
Peter Ping Liu, Professor, Ph D, PE, OCP, CQE and CSTM |
Office: |
4032 (304D) Klehm Hall
11:00 AM- 12:00 PM, Monday through Friday
This is the best time to see your instructor to discuss any problems, questions or concerns.
|
Phone: |
(217)581-6267 (with voice mail) |
Email: |
Please use the email utility within WebCT/Blackboard to communicate with the instructor regarding any issues on this course.
|
Instant Messenger (IM): |
User ID: peter_ping_liu
IM: Yahoo Messenger
During my office hour, I use Yahoo messenger to chat with students who do not reside in Charleston. If you live in Charleston, please see me in my office.
|
Course Description: |
Study of principles and practices of implementing computer database security in modern businesses and industries, including database security principles, database auditing, security implementation and database reliability.
|
Credit: |
2-2-3 |
Prerequisite: |
Official:
- TEC 5323 Advanced Database Technology, or equivalent (basic understanding on Oracle SQL and SQL script).
- You need a high performance computer that can run Oracle database Enterprise Edition (9i, 10g or 11g).
Unofficial: Willingness to have fun and contribute to the class.
|
Learning Objectives: |
- Demonstrate understanding of current database technology and typical database products.
- Demonstrate understanding of security architecture in modern computer systems in a typical enterprise.
- Formulate a working definition of database security and administration.
- Identify contemporary practices of operating system security.
- Demonstrate the knowledge and skills for administration of user, profiles, password policies, privileges and roles.
- Manage database security on application level.
- Conduct database auditing for security and reliability.
- Implement typical security projects on enterprise systems.
|
Readings: |
Text: You are required to read the entire textbook assigned for this course, as follows:
Hassan A. Afyouni, Database Security and Auditing: Protecting Data Integrity and Accessibility, Thomson Course Technology (c2006)
|
Course Outline: |
• Introduction: Security issues faced by enterprises
• Installing a typical database product
• Security architecture
• Operating system security principles
• Administration of users
• Profiles, password policies, privileges and roles
• Database application security models
• Database auditing models
• Application data auditing
• Practices of database auditing
|
Performance Assessment: |
Student achievement will be assessed and grades will be given according to class participation and contribution (including weekly discussion, and weekly "community solutions"), database security project, mid-term test and final project. Grades will be determined upon the following distribution:
Class participation/Weekly Discussion: |
15% |
Class Contribution/Weekly Community Solutions: |
10% |
Database lab security projects and reports |
50% |
Mid-term test |
10% |
Final project |
15% |
Individual grade is based on the total score using the following scale:
Total >= 90 |
A |
80 <= Total <90 |
B |
70 <= Total < 80 |
C |
60 <=Total < 70 |
D |
Total< 60 |
F |
|
ADA Statement: |
If you have a documented disability and wish to receive academic accommodations, please contact the Coordinator of the Office of Disability Services (581-6583) as soon as possible. |
Unofficial Statement: |
Having fun is part of human nature. Go for it. |