Professional Documents
Culture Documents
Course Code
Course Title
Course Planner
Lectures
INT515
DATABASE SECURITY
14105::Ramandeep Singh
Course Category
3.0
0.0
0.0
TextBooks
Sr No
Title
Author
Edition
Year
Publisher Name
T-1
Mark Rhodes-Ousley
2nd
2013
Reference Books
Sr No
Title
Author
Edition
Year
Publisher Name
R-1
1st
2009
Wiley
Relevant Websites
Sr No
Salient Features
RW-1
http://www.w3schools.com/sql/sql_injection.asp
RW-2
http://download.oracle.com/oll/tutorials/SQLInjection/index.htm
RW-3
http://www.oracle.com/technetwork/database/features/plsql/overview/how-to-writeinjection-proof-plsql-1-129572.pdf
RW-4
http://sec4app.com/download/SqlInjection.pdf
Salient Features
AV-1
http://www.youtube.com/watch?v=PB7hWlqTSqs
AV-2
http://www.youtube.com/watch?v=gK3no-TYNRQ
Spill Over
3.0
Week
Number
Lecture
Number
Week 1
Lecture 1
T-1:Chapter 1
Lecture 2
T-1:Chapter 1
Lecture 3
T-1:Chapter 1
Discussion about
Knowledge about
Class Discussion
vulnerabilities present in vulnerabilities present
Security Infrastructure. in Security
Infrastructure and what
is to be done to deal
with these vulnerability
Lecture 4
T-1:Chapter 1
Discussion about
building a security
program
Knowledge about
building a security
program
Lecture 5
T-1:Chapter 1
Lecture 6
T-1:Chapter 2
T-1:Chapter 2
Lecture 7
T-1:Chapter 2
Discussion about
Knowledge about
Class Discussion
Different type of threats. different type of threats.
Lecture 8
T-1:Chapter 2
Lecture 9
R-1:Chapter 2
Demonstration with
SQL Server
Lecture 10
R-1:Chapter 2
Knowledge about
installing SQL Server.
SQL Server
Installation
Demonstration
Lecture 11
R-1:Chapter 2
Knowledge about
installing SQL Server.
SQL Server
Installation
Demonstration
Week 2
Week 3
Week 4
Chapters/Sections
of Text/reference
books
Learning Outcomes
Pedagogical Tool
Demonstration/ Case
Study / Images /
animation / ppt etc.
Planned
Class Discussion
Week 4
Lecture 12
R-1:Chapter 2
Demonstration through
Projector and SQL
Server
Week 5
Lecture 13
R-1:Chapter 2
Demonstration through
Projector and SQL
Server
Lecture 14
R-1:Chapter 2
Discussion about
additional considerations
for SQL Server
Installation
Lecture 15
Week 6
Week 7
Knowledge about
Demonstrations of
additional
SQL Server
considerations for SQL
Server Installation
Term Paper,Test1
Lecture 16
Authorization Authentication
Roles(SQL Server Authorization)
R-1:Chapter 6
Lecture 17
Authorization Authentication
Roles(SQL Database Roles)
R-1:Chapter 6
SQL Server
Demonstration about
SQL Server Roles
Lecture 18
Authorization Authentication
Roles(SQL Server Authentication)
R-1:Chapter 6
Discussion about
creating users and
enforcing password
policy on Users.
Knnowledge about
creating users and
enforcing password
policy on Users.
SQL Server
Demonstration about
SQL Authentication
Lecture 19
Authorization Authentication
Roles(SQL Server Authentication)
R-1:Chapter 6
Discussion about
creating users and
enforcing password
policy on Users.
Knnowledge about
creating users and
enforcing password
policy on Users.
SQL Server
Demonstration about
SQL Authentication
Lecture 20
Authorization Authentication
Roles(SQL Server Database
Policy)
R-1:Chapter 6
Lecture 21
Authorization Authentication
Roles(SQL Server Database
Policy)
R-1:Chapter 6
MID-TERM
Week 8
Lecture 22
R-1:Chapter 6
Lecture 23
R-1:Chapter 6
Week 8
Lecture 24
R-1:Chapter 6
Week 9
Lecture 25
R-1:Chapter 10
Discussion about
Backups, Restores and
Encryption at the Storage
level with Encryption
key Management
Knowledge about
Backups, Restores and
Encryption at the
Storage level with
Encryption key
Management
Demonstrations and
Discussion
Lecture 26
R-1:Chapter 10
Discussion about
Backups, Restores and
Encryption at the Storage
level with Encryption
key Management
Knowledge about
Backups, Restores and
Encryption at the
Storage level with
Encryption key
Management
Demonstrations and
Discussion
Lecture 27
R-1:Chapter 10
Discussion about
Backups, Restores and
Encryption at the Storage
level with Encryption
key Management
Knowledge about
Backups, Restores and
Encryption at the
Storage level with
Encryption key
Management
Demonstrations and
Discussion
Lecture 28
R-1:Chapter 10
Discussion about
Backups, Restores and
Encryption at the Storage
level with Encryption
key Management
Knowledge about
Backups, Restores and
Encryption at the
Storage level with
Encryption key
Management
Demonstrations and
Discussion
Lecture 29
T-1:Chapter 19
Class Discussion
Lecture 30
T-1:Chapter 19
Class Discussion
Week 10
Week 11
Lecture 31
Term Paper,Test2
Lecture 32
T-1:Chapter 7
RW-1
Introduction to SQL
Injection
Introduction to SQL
Injection
Class Discussion
Lecture 33
T-1:Chapter 7
RW-1
Introduction to SQL
Injection
Introduction to SQL
Injection
Class Discussion
Week 12
Week 13
Week 14
Lecture 34
SQL Injection(Identifying
Vulnerabilities)
T-1:Chapter 7
RW-2
Lecture 35
SQL Injection(Exploitation of
Privileges and Passwords)
T-1:Chapter 7
RW-3
Lecture 36
T-1:Chapter 7
RW-3
Lecture 37
Term Paper,Test,Mini
project3
Lecture 38
T-1:Chapter 7
RW-2
Lecture 39
T-1:Chapter 7
RW-2
Lecture 40
T-1:Chapter 29
R-1:Chapter 9
Discussion about
Disaster Recovery in
SQL Server and
Business Continuity Plan
about Disaster
Recovery in SQL
Server and Business
Continuity Plan
Lecture 41
T-1:Chapter 29
R-1:Chapter 9
Discussion about
Disaster Recovery in
SQL Server and
Business Continuity Plan
about Disaster
Recovery in SQL
Server and Business
Continuity Plan
Lecture 42
T-1:Chapter 29
R-1:Chapter 9
Discussion about
Disaster Recovery in
SQL Server and
Business Continuity Plan
about Disaster
Recovery in SQL
Server and Business
Continuity Plan
SPILL OVER
Week 15
Lecture 43
Spill Over
Lecture 44
Spill Over
Lecture 45
Spill Over
Frequency
Out Of
2
3
Total :-
20
10
20
AT No.
Objective
Evaluation Mode
Allottment /
submission Week
Test1
To test the student Questions will be from syllabus upto week 5. Test Will contain 6 Individual
knowledge for the
question of 5 marks each or vice versa. Questions will be a mix of
syllabus which have analytical and descriptive questions.
been covered in the
class upto week 5
Answer sheets
submitted by the
students will be
evaluated and marks
shall be awarded
according to the
same.
4/5
Term Paper1
To gice students an Topics will be allocated to the student they will conduct research Individual
oppurtunity to
and submit a written report to the instructor followed by
research and come presentation.
up with various
technologies,
vulnerabilities and
incidents which have
taken place in the
feild of database
security and analysis
of effectiveness.
Report and
Presentation will be
evaluated by the
class teacher and
marks will be
according to that.
4 / 12
Test2
To test the student Questions will be from syllabus from week 6upto week 10. Test
knowledge for the
Will contain 6 question of 5 marks each or vice versa. Questions
syllabus covered in will be a mix of analytical and descriptive questions.
the class from week
6 to week 10
Marks will be
awarded according
to the solution
submitted by the
student.
8 / 10
Individual
List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper)
Sr. No.
Topic
1 Authentication techniques based on Hash Functions
2 Ethical hacking Tools & Techniques
3 Cryptography and Overview of crypto Systems
4 Use of stegnography in Information Security
5 Security Concerns in Internet Banking
6 Intrusion Detection System
7 Viruses- Types, Damages and Laws
8 Cyber Crime Laws
9 Phishing Techniques