ºÚ¹Ï³ÔÁÏÍø
CS2DI17NU-Databases and Information Security
Module Provider: Computer Science
Number of credits: 20 [10 ECTS credits]
Level:5
Semesters in which taught: Semester 1 / 2 module
Pre-requisites: CS1PC20NU Programming in C/C++ and CS1FC16NU Fundamentals of Computer Science
Non-modular pre-requisites:
Co-requisites:
Modules excluded:
Current from: 2023/4
Module Convenor: Dr Martin Lester
Email: m.lester@reading.ac.uk
NUIST Module Lead: Ruyun Tian
Email: tianry@nuist.edu.cn
Type of module:
Summary module description:
The module consists of two parts.
The first part, Databases, covers an introduction to the basics of relational database design, Structured Query Language (SQL) and some selected advanced database topics.
The second part covers the major threats and risks that affect the security of a network and the systems that rely on it (network security), and the major threats to data in both structured and unstructured form (data security).
Ìý
Aims:
Databases provides students with the underlying principles and practical experience necessary to design and implement scalable, secure databases. Information Security aims to build knowledge to counter the threats to a computer system and to minimise risks with technical mechanisms.
This module also encourages students to develop a set of professional skills such as end user awareness, software design and development, creativity, team working and personal development planning.
Assessable learning outcomes:
Databases:
The student will be able to:
- Carry out the analysis of a simple problem susceptible to solution using database technology;
- Produce a well-structured design in terms of the structural elements of a relational database;
- Design and implement a database application to solve the problem posed;
- Use the SQL language, including DDL, an in-database procedural language such as PL/SQL, and database triggers;
Information Security:
The student will be able to:
- Identify ways of countering different types of threat;
- Produce strategies to minimise risks of security breaches in a range of network environments and data storage systems;
- Critically analyse the shortcomings of a range of security strategies;
- Describe and apply the techniques used to penetrate a Web application;
- Develop appropriate security policies and network architectures to minimise the threats from network intrusion;
- Understand the differenttypes of threat posed by different classes of hacker and by different categories of malware;
- Describe and apply the principles of key cryptography and message digests in security protocols such as SSL;
- Apply appropriate access controls and authentication techniques at different levels;
- Critically analyse the security and privacy issues surrounding structured and unstructured data in a variety of different scenarios, with an in-depth focus on securing such data in Web applications.
Additional outcomes:
Practical experience in design and implementation of a relational database.
Practical experience of network scanning and penetration testing techniques.
Outline content:
Databases:
- Database Management Systems
- Relational database model (ER model, relations, attributes, data structures and keys)
- Normalisation
- Database definition (SQL - DDL)
- Transactions, concurrency and consistency (SQL - TCL)
- Database manipulation (SQL – DML, multipurpose queries, database population, views, stored procedures, triggers)
Information security:
- The CIA (Confidentiality, Integrity, Availability) model of information security
- The value of information assets and physical assets, and the cost of their loss
- Motives and capabilities of different attackers
- Examples of attacks on a networked system at different levels of the OSI network stack
- Examples of countermeasures for different attacks
- Passwords and other methods of authentication
- Public/private key cryptography, digital signatures and certificates
- Multi-level security and access control
- Non-technical aspects: social engineering and physical security
- The effect of social, legal and economic incentives on security
- Responsible and ethical use of technical skills and knowledge by organisations and individuals
Brief description of teaching and learning methods:
Lectures supported by laboratory practicals, seminars and a number of assignments.
Ìý | Semester 1 | Semester 2 |
Lectures | 30 | 29 |
Practicals classes and workshops | 18 | 18 |
Guided independent study: | Ìý | Ìý |
Ìý Ìý Wider reading (independent) | 10 | 11 |
Ìý Ìý Exam revision/preparation | 15 | 15 |
Ìý Ìý Advance preparation for classes | 10 | 10 |
Ìý Ìý Preparation of practical report | 15 | 15 |
Ìý Ìý Reflection | 2 | 2 |
Ìý | Ìý | Ìý |
Total hours by term | 100 | 100 |
Ìý | Ìý | Ìý |
Total hours for module | 200 |
Method | Percentage |
Written exam | 50 |
Set exercise | 50 |
Summative assessment- Examinations:
OneÌý2-hour examination paper in May/June.
Summative assessment- Coursework and in-class tests:
There are two pieces of coursework:
- Database development (including design, implementation and testing (25%%)
- Information Security assessment on penetration testing (25%)
Formative assessment methods:
Students receive formative feedback through the weekly practical exercises.
Penalties for late submission:
The Support Centres will apply the following penalties for work submitted late:
- where the piece of work is submitted after the original deadline (or any formally agreed extension to the deadline): 10% of the total marks available for that piece of work will be deducted from the mark for each working day (or part thereof) following the deadline up to a total of five working days;
- where the piece of work is submitted more than five working days after the original deadline (or any formally agreed extension to the deadline): a mark of zero will be recorded.
You are strongly advised to ensure that coursework is submitted by the relevant deadline. You should note that it is advisable to submit work in an unfinished state rather than to fail to submit any work.
Assessment requirements for a pass:
A mark of 40% overall.
Reassessment arrangements:
One 3-hour examination paper in August/September.Ìý Note that the resit module mark will be the higher of (a) the mark from this resit exam and (b) an average of this resit exam mark and previous coursework marks, weighted as per the first attempt (50% exam, 50% coursework).
Additional Costs (specified where applicable):
Last updated: 17 April 2023
THE INFORMATION CONTAINED IN THIS MODULE DESCRIPTION DOES NOT FORM ANY PART OF A STUDENT'S CONTRACT.