Security in Modern Information System

wanderooswarrenΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

42 εμφανίσεις

SUBJECT SYLLABUS

(
Major:
Computer Science
)


1.

Subject name
:


SECURITY IN MODERN INFORMATION SYSTEMS

2.


Credit
:
3

3.

Instructor
s
:

Dr.
DANG T
RAN KHANH

4.

Department
:

Information Systems
, Faculty of
Computer Science & Engineering

5.

Course Description
:

The objective of
this module is to provide students with general and
technical knowledge and skills to understand security policies, models, and mechanisms
for secrecy, integrity, and availability in modern information systems. Main topics include
methods of protecting dat
a & information: cryptography & security protocols,
discretionary and mandatory security for database systems, information flow controls,
inference problem, auditing, digital signature, and new security issues & research
directions in modern data managemen
t systems & applications.

6.

Subject content
:

No

Content

Reference

1

Introduction to Information Systems Security

[1
]
,

[4]
,
[5], [6]

2

Cryptography & Security Protocols

[2]
, [9]

3

Discretionary Access Controls (DAC)

[1],

[
3
]
, [4]

4

Mandatory Access Contr
ols (MAC)

[1],

[
3
]
, [4]

5

Inference Problem in DBMSs & Modern Applications

[1],

[
4
]
, [5], [7]

6

Auditing

[
4
]
, [5], [7]

7

Privacy & Digital Identity Management

[
2
],

[
4
]
, [5], [6]

8

Digital Watermarking & Steganography

[
2
],

[
5
]

9

Outsourced Database Ser
vices

[
1
]
, [2], [4]

10

Security Issues in Other Modern Data Management Systems and
Applications

[
4
],

[
10
]

11

Revision



7.

Reference Literature
:

[1] S. Castano, M. Fugini, G. Martella, and P. Samarati,
Database Security
, ACM Press &
Addison
-
Wesley, ISBN
0
-
201
-
59375
-
0, 1995.

[2] W. Mao,
Modern Cryptography
-

Theory and Practice
, 3
rd

Edittion, Prentice Hall, ISBN
0
-
13
-
066943
-
1, 2003.

[3] D.C. Knox,
Effective Oracle Database 10g Security by Design
, Oracle Press, ISBN 0
-
07
-
223130
-
0, 2004.

[4] B. Thuraisin
gham,
Database and Applications Security


Integrating Information
Security and Data Management
, Auerbach Publications, ISBN 0
-
8493
-
2224
-
3, 2005.

[5] A. Umar,
Information Security and Auditing in the Digital Age

(revised version
-
August
2004), NGE Solutio
ns, ISBN 0
-
9727
-
4147
-
X, 2004.

[6]

M. Bishop,
Computer Security


Art and Science
, Addison
-
Wesley, ISBN 0
-
201
-
44099
-
7, 2003.

Biểu mẫu 3

[7]

R.B. Natan,
Implementing Database Security and Auditing
, Elsevier Digital Press,
ISBN 1
-
55558
-
334
-
2, 2005.

[8]

N. Shah.
Datab
ase Systems Using Oracle


A Simplified Guide to SQL and PL/SQL
,
2
nd

Edittion, Prentice Hall, ISBN 0
-
13
-
191180
-
5, 2005.

[9]

A. Menezes, P. van Oorschot, and S. Vanstone,
Handbook of Applied Cryptography
,
CRC Press, 2005.

[10]

A. Umar,
Mobile Computing an
d Wireless Communications (Applications, Networks,
Platforms,Architectures, and Security)
, NGE Solutions, ISBN: 0
-
9759182
-
0
-
6, 2004

[1] S. Castano, M. Fugini, G. Martella, and P. Samarati,
Database Security
, ACM Press &
Addison
-
Wesley, ISBN
0
-
201
-
59375
-
0, 1995.

[2] W. Mao,
Modern Cryptography
-

Theory and Practice
, 3
rd

Edittion, Prentice Hall, ISBN
0
-
13
-
066943
-
1, 2003.

[3] D.C. Knox,
Effective Oracle Database 10g Security by Design
, Oracle Press, ISBN 0
-
07
-
223130
-
0, 2004.

[4] B. Thuraisin
gham,
Database and Applications Security


Integrating Information
Security and Data Management
, Auerbach Publications, ISBN 0
-
8493
-
2224
-
3, 2005.

[5] A. Umar,
Information Security and Auditing in the Digital Age

(revised version
-
August
2004), NGE Solutio
ns, ISBN 0
-
9727
-
4147
-
X, 2004.

[6]

M. Bishop,
Computer Security


Art and Science
, Addison
-
Wesley, ISBN 0
-
201
-
44099
-
7, 2003.


8.

Evaluation
:

No

Method

Number of test

Weight
(%)

1

Mid
-
term
exam



2

Lab

1

3
0

3

Seminar,
Group presentation

1

20

4

F
inal

exam

1

50




Instructor
s







Dr. D
ang Tran Khanh

[7]

R.B. Natan,
Implementing Database Security and Auditing
, Elsevier Digital Press,
ISBN 1
-
55558
-
334
-
2, 2005.

[8]

N. Shah.
Datab
ase Systems Using Oracle


A Simplified Guide to SQL and PL/SQL
,
2
nd

Edittion, Prentice Hall, ISBN 0
-
13
-
191180
-
5, 2005.

[9]

A. Menezes, P. van Oorschot, and S. Vanstone,
Handbook of Applied Cryptography
,
CRC Press, 2005.

[10]

A. Umar,
Mobile Computing an
d Wireless Communications (Applications, Networks,
Platforms,Architectures, and Security)
, NGE Solutions, ISBN: 0
-
9759182
-
0
-
6, 2004