Schedule Online Admission Counselling Meeting with Us
Apply Now - 2024

Data Security Systems

GANPAT UNIVERSITY 

FACULTY OF ENGINEERING & TECHNOLOGY

Programme

Bachelor of Technology

Branch/Spec.

Computer Science & Engineering (CS)

Semester

VI

Version

1.0.0.0

Effective from Academic Year

2022-23

Effective for the batch Admitted in

June 2021

Subject  code

2CSE609

Subject Name

DATA SECURITY SYSTEMS

Teaching scheme 

Examination scheme (Marks)

(Per week)

Lecture(DT)

Practical(Lab.)

Total

CE

SEE

Total

L

TU

P

TW

Credit 

3

0

2

0

5

Theory 

40

60

100

Hours

3

0

4

0

7

Practical

60

40

100

Pre-requisites:

Knowledge of SQL queries and other databases,  Knowledge of advanced UNIX commands, Familiarity with data protection standards 

Learning Outcome:

After Successful completion of the course, students will be able to:

  • Understand data security and its importance
  • Understand  Different Data Security Compliance and Standard
  • Discover data security vulnerabilities in real-time
  • Protect critical data with secure solutions

Theory syllabus

Unit

Content

Hrs

1

Data Security Overview and Architecture:

 Overview, Functionality, Components, Architecture, Architectural Components, Capturing database traffic,  Using Aggregation and Central Management

7

2

User Interface: 

Navigating the user interface, Using the command line interface (CLI), Access Management  

8

3

System View and Data Management:

 System View and Configuration, Data Management, Groups, Building groups, Populating Groups 

7

4

Policy Management: 

Policy Overview, Installing and Creating Policies, Access Rules, Exception and Extrusion Rules, Selective Audit Trail Policy, Policy Rule Order and Logic, S-GATE

7

5

Auditing, Vulnerability Assessment, and Discovery: 

Using the configuration Auditing System (CAS), Performing Vulnerability Assessment, Using Database Discovery, Custom Queries and Reports

8

6

Compliance Workflow Automation:

 Creating a Compliance Workflow, Managing Audit Results, File Activity Monitoring, File Activity Monitoring Components, Organizing Files, Creating Policies that manage files 

8

Suggested Practical List

Practical contents will be based on following concepts:

  •   Guradium Interface
  •  Data Extraction
  •  Data Security Policy
  •  Data Auditing

Text Books

1

Data driven Security- Analysis, Visualization and dashboards by Jay Jacobs, Bob Rudis Wiley Publication.

Reference link

1

Deployment Guide for InfoSphereGuardium By Whei-Jen Chen, Boaz Barkai, Joe M DiPietro, VladislavLangman, Daniel Perlov, Roy Riah, Yosef Rozenblit, Abdiel Santos, Redbooks

Course Outcomes:

COs

Description

CO1

Understand data security and its importance

CO2

Understand Different Data Security Compliance and Standard

CO3

Discover data security vulnerabilities in real time

CO4

Protect critical data with secure solutions

Mapping of CO and PO:

COs

PO1

PO2

PO3

PO4

PO5

PO6

PO7

PO8

PO9

PO10

PO11

PO12

CO1

3

2

1

2

2

1

1

1

0

1

2

2

CO2

3

3

3

3

3

2

3

3

1

1

2

1

CO3

3

2

2

3

3

2

3

3

1

3

3

2

CO4

3

2

2

3

3

2

3

3

1

2

2

2