{"id":2162,"date":"2016-07-11T13:29:24","date_gmt":"2016-07-11T13:29:24","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=2162"},"modified":"2021-10-27T20:37:07","modified_gmt":"2021-10-27T20:37:07","slug":"jntuh-b-tech-4th-year-2-sem-computer-science-and-engineering-r13-4-2-database-security-elective-iv-r13-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-4th-year-2-sem-computer-science-and-engineering-r13-4-2-database-security-elective-iv-r13-syllabus\/","title":{"rendered":"JNTUH B.Tech 4th Year 2 sem Computer Science and Engineering R13 (4-2) Database Security (Elective \u2013 IV) R13 syllabus."},"content":{"rendered":"<p style=\"text-align: justify\">JNTUH B.Tech 4th year (4-2) Database Security gives you detail information of Database Security (Elective \u2013 IV) R13 syllabus It will be help full to understand you complete curriculum of the year.<\/p>\n<p style=\"text-align: justify\"><strong>Objectives<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>To learn the security of databases<\/li>\n<li>To learn the design techniques of database security<\/li>\n<li>To learn the secure software design<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>UNIT- I<\/strong><\/p>\n<p style=\"text-align: justify\">Introduction: Introduction to Databases Security Problems in Databases Security Controls Conclusions<\/p>\n<p style=\"text-align: justify\">Security Models -1: Introduction Access Matrix Model Take-Grant Model Acten Model PN Model Hartson and Hsiao\u2019s Model Fernandez\u2019s Model Bussolati and Martella\u2019s Model for Distributed databases<\/p>\n<p style=\"text-align: justify\"><strong>UNIT-II<\/strong><\/p>\n<p style=\"text-align: justify\">Security Models -2: Bell and LaPadula\u2019s Model Biba\u2019s Model Dion\u2019s Model Sea View Model Jajodia and Sandhu\u2019s Model The Lattice Model for the Flow Control conclusion<\/p>\n<p style=\"text-align: justify\">Security Mechanisms : Introduction User Identification\/Authentication Memory Protection Resource Protection Control Flow Mechanisms Isolation Security Functionalities in Some Operating Systems Trusted Computer System Evaluation Criteria<\/p>\n<p style=\"text-align: justify\"><strong>UNIT- III<\/strong><\/p>\n<p style=\"text-align: justify\">Security Software Design : Introduction A Methodological Approach to Security Software Design Secure Operating System Design Secure DBMS Design Security Packages Database Security Design<\/p>\n<p style=\"text-align: justify\">Statistical Database Protection &amp; Intrusion Detection Systems: Introduction Statistics Concepts and Definitions Types of Attacks Inference Controls evaluation Criteria for Control Comparison. Introduction IDES System RETISS System ASES System Discovery.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p style=\"text-align: justify\"><strong>TEXT BOOKS<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Database Security by Castano Pearson Edition (lie) Database Security and Auditing: Protecting Data Integrity and Accessibility, 1st Edition, Hassan Afyouni, THOMSON Edition.<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>REFERENCE BOOK<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Database security by alfred basta, melissa zgola, CENGAGE learning.<\/li>\n<\/ul>\n<p style=\"text-align: justify\"><strong>Outcomes<\/strong><\/p>\n<ul style=\"text-align: justify\">\n<li>Ability to carry out a risk analysis for large database.<\/li>\n<li>Ability to set up, and maintain the accounts with privileges and roles.<\/li>\n<\/ul>\n<p style=\"text-align: justify\">For more information about all JNTU updates please stay connected to us on FB and don\u2019t hesitate to ask any questions in the comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>JNTUH B.Tech 4th year (4-2) Database Security gives you detail information of Database Security (Elective \u2013 IV) R13 syllabus It will be help full to understand you complete curriculum of [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[2,153,123,62],"tags":[],"class_list":["post-2162","post","type-post","status-publish","format-standard","hentry","category-cse","category-2nd-sem-2","category-4th-year","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=2162"}],"version-history":[{"count":4,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2162\/revisions"}],"predecessor-version":[{"id":17466,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/2162\/revisions\/17466"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=2162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=2162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=2162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}