CIT 34400/ 3 Cr.
This course will cover fundamentals of database security, data auditing, basic security models, and best practices. Topics may include security architecture, access control policies, auditing and monitoring. The course combines lectures with hands-on activities through lab sessions and an application oriented project using a database system such as Oracle or SQL Server.
- Available Online: No
- Credit by Exam: No
- Laptop Required: Yes
CIT 20300 and CIT 30400
Course Outcomes(What are these?)
- Outline the fundamentals of security, and how it relates to information systems (CIT k)
- Identify risks and vulnerabilities in operating systems from a database perspective (CIT m)
- Construct and justify good password policies, and techniques to secure passwords (CIT k, m)
- Implement administration policies for users (CIT m)
- Compare the various database security models (CIT m)
- Implement a Virtual Private Database using views, roles, and application context (CIT c, k)
- Define, develop and analyze an interesting database security related research project. (CIT d, k)
CIT Student Outcomes(What are these?)
(c) An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs.
(d) An ability to function effectively on teams to accomplish a common goal.
(k) An ability to identify and analyze user needs and take them into account in the selection, creation, evaluation and administration of computer-based systems.
(m) An understanding of best practices and standards and their application.
- Security Architecture
- Operating System Security Fundamentals
- Administration of Users
- Profiles, Password Policies, Privileges, and Roles
- Database Applications Security Models
- Virtual Private Databases
- Database Auditing Models
- Application and Data Auditing
- Auditing Database Activities
- Security and Auditing Cases Project Security
Principles of Undergraduate Learning (PULs)
2. Critical Thinking
3. Integration and Application of Knowledge
4. Intellectual Depth, Breadth, and Adaptiveness