IT & Mobile Security

Database Security

Seminar, 2.00 ECTS


Course content

This course covers all important aspects of Database Security (DB-Authentication, Applicaton & Password-Security, DB-Authorization, Granular Access Control, DB2DB Communication, DB-Encryption, DB Auditing). It also provides a thorough introduction to the subject of data quality by studying definitions of data quality, methods of measurement and assurance of data quality (e.g., metrics & constraints) and DB refactoring.

Learning outcomes

The graduate designs, plans and diagnoses computer networks with a focus on mobile infrastructures and database systems and masters the necessary cryptographic applications.

Recommended or required reading and other learning resources / tools

Schneier: Applied Cryptography,
Ferguson, Schneier: Practical Cryptography,
Natan R. Database Security,
Ambler S. Database Refactoring,
"Security and Privacy in Mobile Information and Communication Systems", Andreas U. Schmidt(Hg), 2012, ISBN-13: 978-3642333910
"Mobile Security", Steven Furnell, 2009, ISBN-13: 978-1849280204
"Wireless and Mobile Networks Security (Iste)", H. Chaouchi, ISBN-13: 978-1848211179
"Mobile and Wireless Network Security and Privacy", S. Kami Makki (Hg), 2007, ISBN-13: 978-0387710570
"Mobile and Wireless Networks Security: Proceedings of the MWNS 2008 Workshop", Maryline Laurent-Maknavickius (hg). 2008, ISBN-13: 978-9812833259
"Advanced IPSec VPN Design (Networking Technology)", Vijay Bollapragada, 2005, ISBN-13: 978-1587051111
"Telecommunication System Engineering", Roger L. Freeman, ISBN-13: 978-0471029557
Sammes: Forensic Computing
Anderson: Security Engineering
Bollapragada: IPSec VPN Design
Garfinkel: Practical Unix and Internet Security Freeman: Telecommunication System Engineering
Journals: -

Mode of delivery


Prerequisites and co-requisites

modules ISC 1 and CRY

Assessment methods and criteria

continuous assessment