0% found this document useful (0 votes)
5 views2 pages

Course Outline DSEC-310 Database Security

The DSEC-310 Database Security module at Malawi University of Science and Technology aims to introduce students to database security issues and techniques. Upon completion, students will understand modern security threats, analyze database information, and apply various security assessment tools. The module includes lectures, tutorials, and assessments comprising coursework and final examinations.

Uploaded by

lawrencechikopa1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views2 pages

Course Outline DSEC-310 Database Security

The DSEC-310 Database Security module at Malawi University of Science and Technology aims to introduce students to database security issues and techniques. Upon completion, students will understand modern security threats, analyze database information, and apply various security assessment tools. The module includes lectures, tutorials, and assessments comprising coursework and final examinations.

Uploaded by

lawrencechikopa1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DSEC-310 Database Security

MALAWI UNIVERSITY OF SCIENCE AND TECHNOLOGY

MALAWI INSTITUTE OF TECHNOLOGY

1. Programme(s): BCSS
2. Module Title: Database Security
3. Module Code: DSEC-310
4. Year: 3
5. Credit: 10
6. Presented to: Senate
7. Presented by: Malawi Institute of Technology
8. Lecture (hours/week): 2
9. Tutorial/Laboratory (hours/week): 2
10. Prerequisites: DSYS-210
11. Co-requisites
12. Module Aims:
To introduce database security issues and various state-of-art database security methods
and techniques.

13. Intended learning outcomes


Upon completion of this module, the student should be able to:

● understand and characterize modern techniques of database information security


threats and techniques for database security assessment.
● analyze information in a database to identify information security incidents
● understand and use the main tools for database management systems monitoring.
● use build-in database functions to enable database integrity support.
● understand and identify database information security threats, critically evaluate
and apply the potential countermeasures.
● create a plan for vulnerabilities detection and identification in databases.
● reasonably use and analyze the results obtained by the database vulnerability
scanners.
● apply new methods of a database protection and use tools for database security
assessment
14. Indicative Content
a. Introduction to database security issues: The role of databases in information systems;
Access control management features; Cryptographic data protection; SQL language
features; Statistical databases.
b. Database security methods and techniques: Access control to database objects: tables,
attributes, records; Triggers, views, data masking; Cryptographic methods of
protection; Escaping queries to a database; Change Tracking; Data integrity in
databases; Database backups.
c. Security features in databases: SQL statements for access control; Integrity (domain,
attributes, tables, referential); Database monitoring tools.
d. Database security analysis tools: An overview of the main methods for analyzing
database security; SQL injections; Database security scanners; Writing your own security
analysis tools.

15. Assessment
40% Coursework (tests, exercises, group and individual assignments), 60% Final
Examinations

16. Teaching and Learning Methods/Activities


a. Lectures
b. Tutorials
c. Presentations
d. Group discussions

17. Prescribed Texts


Basta A. and Zgola M. (2011). Database Security. Cengage Learning.

Ben-Natan R. (2005). Implementing database security and auditing. Digital Press.

18. Recommended Resources


Hoffer, J., Venkataraman, R., & Topi, H. (2019). Modern Database Management, (13th
ed.). Pearson Education Limited.

Elmasri, R., & Navathe, S. B. (2015). Fundamentals of Database Systems, (7th ed.).
Pearson Education.

19. Journals

International Journal of Computer Science and Network Security - IJCSNS

International Journal of Computer Science – iaeng

International Journal of Information and Computer Security – inderscience

20. Date: March 2021

You might also like