SEC835 Security in Databases and Web applications Presentation.

Slides:



Advertisements
Similar presentations
Engaging Business Students in Online Research and Critical Thinking through Customized Assignments Henri Mondschein Information Specialist Manager, Information.
Advertisements

COMP 6125 An Introduction to Electronic Commerce Session 0: Introduction & Objectives.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
IS240: Information System Analysis & Design
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Application Threat Modeling Workshop
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Video Game Programmer Occupation.
SEC835 Database and Web application security Information Security Architecture.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Teaching Teaching Discrete Mathematics and Algorithms & Data Structures Online G.MirkowskaPJIIT.
Introduction to Project Management
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
EECE 310 Software Engineering Lecture 0: Course Orientation.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Dr. Sundar ChristopherATS Navigating Graduate School and Beyond: Sow Well Now To Reap Big Later Introduction and Sowing.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Fundamentals of Software Engineering Group 4 – OLBD Solutions Aakant Taurani, Jean Yoo Phil Breczinski, Steven Pingel.
1 Technical & Business Writing (ENG-315) Muhammad Bilal Bashir UIIT, Rawalpindi.
1 The World Bank Internet Services Program Rajan Bhardvaj
Edith Ngai Dept. of Information Technology Uppsala University STS Independent Project Course 1DL931.
COURSE OUTLINE. COURSE OBJECTIVE Students will learn the following Basic concept of knowledge management Knowledge management technology Creativity Process.
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Notes for Week 11 Term project evaluation and tips 3 lectures before Final exam Discussion questions for this week.
Fostering industry relevance in a final year unit Kate Fitch Teaching & Learning Forum 3 February 2005.
1 NES554: Computer Networks Defense Course Overview.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
Mid-Term Exam #2 MIS 2101 Sec 004 C O’Donnell.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
COURSE OUTLINE AZHAR HAMID IAS2143 DATABASE SYSTEM UniselFaculty of Computer Science and Information Technology.
Security Risk Analysis Dr. Lo’ai Tawalbeh Prepared for: The Arab Academy for Business and Financial Sciences (AABFS)-2007.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
EXPERT SYSTEM WEEK 1. C ATALOG D ESCRIPTION Knowledge Acquisition techniques, Knowledge representation, Analysis and Design of an ES, Reasoning strategies,
IMS 4212: Course Introduction 1 Dr. Lawrence West, Management Dept., University of Central Florida ISM 4212 Dr. Larry West
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
BMTS Computer and Systems Pre-requisites :CT140 –Computer Skills Nature Of the Course: This course deals about the fundamentals of Computer such.
Computing & Information Communication Technology
Introduction Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe.
Introduction to Database
Data Analytics for ICT.
CIS 502 Course Experience Tradition / snaptutorial.com
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
BIAM 540 Possible Is Everything/tutorialrank.com.
SEC 400 Competitive Success/snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
IM 300Competitive Success/tutorialrank.com
CMGT 441 Education for Service-- snaptutorial.com
SEC 400 Education for Service-- snaptutorial.com.
HCS 449 Education on your terms/snaptutorial.com.
CIS 333 Education for Service-- tutorialrank.com.
ACC 599 Education for Service/tutorialrank.com
BIAM 540 Education for Service/tutorialrank.com
IM 300 Education for Service-- tutorialrank.com. IM 300 Week 1 Individual Assignment Sharing Database Knowledge For more course tutorials visit
CIS 333 RANK Education for Service-- cis333rank.com.
SEC 240 Education on your terms/tutorialrank.com.
SEC 400 Teaching Effectively-- snaptutorial.com
Information Systems Security Winter
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
GTECH 709 Criteria for evaluation
EECE 310 Software Engineering
CS 456 Interactive Software.
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Data Analytics course.
Introduction to Database
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
Presentation transcript:

SEC835 Security in Databases and Web applications Presentation

Objectives Fundamentals of systems and software security Information security threats and attacks Security services Secure software Databases security Web application security

Course Structure Weeks 1 – 7 Fundamentals Threats and attacks Focused on Security Services, e.g. user authentication, authorization, logging, testing

Course Structure Weeks 8 – 17 Software security Software vulnerabilities and controls Secure programming Databases security Web application security

Course Implementation Strategy Information security topic is large Key points selected Best industry practice is the base Theoretical materials Research projects in the lab Practice in identifying security vulnerabilities and countermeasures

Students Evaluation Lab completeness – 11% Assignments – 24% Mid-term test – 25% Final exam – 40%

Challenges A lot of new terms and definitions Conceptual vision and analytical approach required Writing in English required Presentations and discussions

Job searching tips Include the appropriate message into your resume: Knowledge and tools that help in Writing secure software, including web and database applications GUI-based testing software for security Focus on making practical reference tools you have developed yourself

Words of cautions No intent of making you a security professionals Intent is that working as a programmer, or tester, you understand related security issues and you have some knowledge of how to avoid them