Instructor: |
Peter Ping Liu, Professor, Ph D, PE, OCP, CQE and CSTM |
Office: |
4032 (304D) Klehm Hall
11:00 AM- 12:00 PM, Monday through Friday
This is the best time to see your instructor to discuss any problems, questions or concerns.
|
Phone: |
(217)581-6267 (with voice mail) |
Email: |
Please use the email utility within WebCT/Blackboard to communicate with the instructor regarding any issues on this course.
|
Instant Messenger (IM): |
User ID: peter_ping_liu
IM: Yahoo Messenger
During my office hour, I use Yahoo messenger to chat with students who do not reside in Charleston. If you live in Charleston, please see me in my office.
|
Course Description: |
Study of principles and practices of implementing computer database security in modern businesses and industries, including database security principles, database auditing, security implementation and database reliability.
|
Credit: |
2-2-3 |
Prerequisite: |
Official:
- TEC 5323 Advanced Database Technology, or equivalent (basic understanding on Oracle SQL and SQL script).
- You need a high performance computer that can run Oracle database Enterprise Edition (9i, 10g or 11g).
Unofficial: Willingness to have fun and contribute to the class.
|
Learning Objectives: |
- Demonstrate understanding of current database technology and typical database products.
- Demonstrate understanding of security architecture in modern computer systems in a typical enterprise.
- Formulate a working definition of database security and administration.
- Identify contemporary practices of operating system security.
- Demonstrate the knowledge and skills for administration of user, profiles, password policies, privileges and roles.
- Manage database security on application level.
- Conduct database auditing for security and reliability.
- Implement typical security projects on enterprise systems.
|
Readings: |
Text: You are required to read the entire textbook assigned for this course, as follows:
Hassan A. Afyouni, Database Security and Auditing: Protecting Data Integrity and Accessibility, Thomson Course Technology (c2006)
|
Course Outline: |
Introduction: Security issues faced by enterprises
Installing a typical database product
Security architecture
Operating system security principles
Administration of users
Profiles, password policies, privileges and roles
Database application security models
Database auditing models
Application data auditing
Practices of database auditing
|
Performance Assessment: |
Student achievement will be assessed and grades will be given according to class participation and contribution (including weekly discussion, and weekly "community solutions"), database security project, mid-term test and final project. Grades will be determined upon the following distribution:
Class participation/Weekly Discussion: |
15% |
Class Contribution/Weekly Community Solutions: |
10% |
Database lab security projects and reports |
50% |
Mid-term test |
10% |
Final project |
15% |
Individual grade is based on the total score using the following scale:
Total >= 90 |
A |
80 <= Total <90 |
B |
70 <= Total < 80 |
C |
60 <=Total < 70 |
D |
Total< 60 |
F |
|
ADA Statement: |
If you have a documented disability and wish to receive academic accommodations, please contact the Coordinator of the Office of Disability Services (581-6583) as soon as possible. |
Unofficial Statement: |
Having fun is part of human nature. Go for it. |