Saturday, February 14, 2015

Welcome to Database Security






 Welcome to Database Security


Goal: 
To adequately prepare the students to offer the best practices in database security strategies and to provide them with the tools, techniques and industry accepted methodologies for database management.

Important things should be known after studying this course:

    * Describe Database Security Overview, Security issues and Access Control Models.
    * Apply Transaction Management, Concurrency Control, Reliability, Data Replication.
    * Analyze the Database similarities in various Database Architectures ( ORACLE, MySQL,
       Microsoft SQL Server).
    * Apply the concepts of authentication and authorization through User Creation and
       Administration - Passwords, Profiles, Privileges, and Roles.
    * Experiment the different locking strategies and discuss about dead lock detection.
    * Explain about SQL injection, identifying the vulnerabilities, SQL Injection Exploitation and
       Defense.
    * Discuss the database auditing models, its applications and practices.
    * Classify the security issues in MLS architecture, Cloud data management and secure stream data        management.




IT Society blog Team

About the Author

Saed Said Al-badri

Author & Editor

Student in Al-Musanna College of Technology, Stay tuned for the new !!!

Post a Comment

 
IT Society ©