COMP3335 Notes

1 Introduction to Data/Information Security

1.1 Data, Information & Knowledge

1.2 Data/Information Storage in Computer Systems

1.3 Security Requirements on Data/Information

1.4 Security Mechanism (Method, tool)

1.5 Security Control

1.6 Data Breach (data stolen or lost)


2 Database Fundamentals

2.1 Database and DBMS architecture

2.2 Relational Model & SQL

2.3 NoSQL

2.4 Relational Databases V.S. NoSQL

 noSQLRelational Databases
Data models and schemaUnstructuredStructured
Data structureDocument-basedTable-based
ScalingHorizontalVertical
Development modelOpen sourceClose source

2.5 Normalization

 


3 Database Security: Availability

3.1 Database Availability

3.2 Database Consistency

3.3 The CAP Theorem (for a distributed database)

3.4 Case Study: MongoDB

 


4 Database Security: Confidentiality

4.1 Attack Surface

4_1_1

4.2 Confidentiality

5 File System Security

5.1 File System Security

5.2 NTFS

 


6 Application Security: SQL Injection

6.1 SQL Injection Attacks

6.2 Countermeasures

 


7 Authorization (Part I)

7.1 Access Control

7.2 Authentication

7.3 Authentication (Guest Lecture)

 


8 Authorization (Part II)

8.1 Access control

8.2 Database User Accounts

 


9 Authorization (Part III)


10 Oracle Security: Oracle Data Safe

 


11 Inference Control

11.1 Privacy

11.2 K-anonymity for Data release

11.3 Differential privacy for Data query

 


12 Database Encryption

 


13 Searchable Encryption (Guest Lecture)