Vous êtes sur la page 1sur 3

Syllabus

Instructor:

Peter Ping Liu, Professor, Ph D, PE, OCP, CQE and CSTM

Office:
4032 (304D) Klehm Hall
11:00 AM- 12:00 PM, Monday through Friday
This is the best time to see your instructor to discuss any
problems, questions or concerns.
Phone:
(217)581-6267 (with voice mail)
Email:

Instant Messenger
(IM):

Please use the email utility within WebCT/Blackboard to


communicate with the instructor regarding any issues on this
course.
User ID: peter_ping_liu
IM: Yahoo Messenger
During my office hour, I use Yahoo messenger to chat with
students who do not reside in Charleston. If you live in Charleston,
please see me in my office.

Course Description:
Study of principles and practices of implementing computer
database security in modern businesses and industries, including
database security principles, database auditing, security
implementation and database reliability.
Credit:

2-2-3

Prerequisite:
Official:
1. TEC 5323 Advanced Database Technology, or equivalent
(basic understanding on Oracle SQL and SQL script).
2. You need a high performance computer that can run Oracle
database Enterprise Edition (9i, 10g or 11g).

Unofficial: Willingness to have fun and contribute to the class.


Learning Objectives:
1. Demonstrate understanding of current database technology
and typical database products.
2. Demonstrate understanding of security architecture in
modern computer systems in a typical enterprise.
3. Formulate a working definition of database security and
administration.
4. Identify contemporary practices of operating system
security.
5. Demonstrate the knowledge and skills for administration of
user, profiles, password policies, privileges and roles.
6. Manage database security on application level.
7. Conduct database auditing for security and reliability.
8. Implement typical security projects on enterprise systems.
Readings:
Text: You are required to read the entire textbook assigned for this
course, as follows:
Hassan A. Afyouni, Database Security and Auditing: Protecting
Data Integrity and Accessibility, Thomson Course Technology
(c2006)
Course Outline:
Introduction: Security issues faced by enterprises
Installing a typical database product
Security architecture
Operating system security principles
Administration of users

Profiles, password policies, privileges and roles


Database application security models
Database auditing models
Application data auditing
Practices of database auditing
Performance
Assessment:

Student achievement will be assessed and grades will be given


according to class participation and contribution (including weekly
discussion, and weekly "community solutions"), database security
project, mid-term test and final project. Grades will be determined
upon the following distribution:
Class participation/Weekly Discussion:

15%

Class Contribution/Weekly Community


Solutions:

10%

Database lab security projects and reports

50%

Mid-term test

10%

Final project

15%

Individual grade is based on the total score using the following


scale:
Total >= 90
80 <= Total <90
70 <= Total < 80
60 <=Total < 70
Total< 60
ADA
Statement:

A
B
C
D
F

If you have a documented disability and wish to receive


academic accommodations, please contact the Coordinator of
the Office of Disability Services (581-6583) as soon as possible.

Unofficial Statement: Having fun is part of human nature. Go for it.

Vous aimerez peut-être aussi