Beruflich Dokumente
Kultur Dokumente
TECHNOLOGY
FACULTY OF ENGINEERING AND TECHNOLOGY
SCHOOL OF COMPUTING
DEPARTMENT OF CSE
COURSE PLAN
FacultyDetails
SLOT OFFICE
& NAME OFFICE HOUR MAIL ID
BATCH
Muruganantham.B murugannatham.b@
D and B1 TP014 Monday- ktr.srmuniv.ac.in
Friday
D and B2 Monday- Annapoorani.p@ktr.srmuniv.ac.in
Dr.Annapoorani.P TP706 Friday
TEXT BOOK
1. Hassan A. Afyouni, “Database Security and Auditing”, Third Edition, Cengage Learning,
2009.(UNIT 1 to IV)
2.Charu C. Aggarwal, Philip S Yu, “Privacy Preserving Data Mining”: Models and Algorithms,
Kluwer Academic Publishers, 2008.(UNIT V).
REFERENCES
1. Ron Ben Natan, ”Implementing Database Security and Auditing”, Elsevier Digital Press,
2005.
2. http://charuaggarwal.net/toc.pdf
3. http://adrem.ua.ac.be/sites/adrem.ua.ac.be/files/securitybook.pdf
Prerequisite : NIL
Objectives
1. To understand the fundamentals of security, and how it relates to information systems.
2. To identify risks and vulnerabilities in operating systems from a database perspective.
3. To learn good password policies, and techniques to secure passwords in an organization.
4. To learn and implement administration policies for users.
5. To understand the various database security models and their advantages or
disadvantages.
6. To learn to implement privacy preserving data mining algorithms.
Assessment Details
Outcomes
Students who have successfully completed this course will have full understanding of the
following Concepts.
Detailed Session Plan
Auditing Database Activities: Using Oracle Database Activities-Creating DLL Triggers with Oracle-
Auditing Database Activities with Oracle-Auditing Server Activity with SQL Server 2000-Security and
Auditing Project Case Study.
Using Oracle Database Activities Group discussion
28& 100 1 PPT
Assignment
29
Creating DLL Triggers with Oracle Group discussion
30& 100 1 PPT
Quiz
31
Auditing Database Activities with Oracle Group discussion
32& 100 1 PPT
Assignment
33
Auditing Server Activity with SQL Group discussion
34 50 1 PPT
Server 2000 Assignment
Security and Auditing Project Case Objective type test
35& Study. 100 1 PPT Quiz
36 Group discussion
UNIT V - PRIVACY PRESERVING DATA MINING TECHNIQUES
Privacy Preserving Data Mining Techniques: Introduction- Privacy Preserving Data Mining Algorithms-
General Survey-Randomization Methods-Group Based Anonymization-Distributed Privacy Preserving Data
Mining-Curse of Dimensionality-Application of Privacy Preserving Data Mining
37 Privacy Preserving Data Mining 100 1 PPT Group discussion
& Techniques: Introduction
38
Privacy Preserving Data Mining Group discussion
39& 100 1 PPT
Algorithms Comparative study
40
PREPARED BY APPROVED BY