Welcome to Database Security
Goal:
To adequately prepare
the students to offer the best practices in database security strategies
and to provide them with the tools, techniques and industry accepted
methodologies for database management.
Important things should be known after studying this course:
* Describe
Database Security Overview, Security issues and Access Control Models.
* Apply Transaction Management, Concurrency Control, Reliability, Data
Replication.
* Analyze
the Database similarities in various Database Architectures ( ORACLE, MySQL,
Microsoft SQL Server).
Microsoft SQL Server).
* Apply
the concepts of authentication and authorization through User Creation and
Administration - Passwords, Profiles, Privileges, and Roles.
Administration - Passwords, Profiles, Privileges, and Roles.
* Experiment
the different locking strategies and discuss about dead lock detection.
* Explain
about SQL injection, identifying the vulnerabilities, SQL Injection
Exploitation and
Defense.
Defense.
* Discuss
the database auditing models, its applications and practices.
* Classify
the security issues in MLS architecture, Cloud data management and secure
stream data management.
IT Society blog Team
Post a Comment