Click the assignment to download the zip to view the data in SQL.
CIS 310 – This course will provide a solid and practical foundation for the design and implementation of database systems. Emphasis will be on relational database models, with significant coverage of basic relational database concepts, normalization, E-R modeling, locking, SQL, and distributed databases. Additional topics include web database, database security, access control policies and procedures, risk management, and ethical aspects of information handling. Course software includes current database tools such as SQL server.
Assignment 7 demonstrates the ability to write SQL queries to display specific data from a database.
Assignment 8 demonstrates the ability to write more complex SQL queries, utilizing select queries, creating views, inner joins, and constraints.
Assignment 9 demonstrates the ability to utilize Insert, Update and Delete cases
Assignment 10 is a culminating Assignment from CIS 310. This assignment was to create and drop tables from a database, then to take the created tables and construct a star-shaped database, constructing Primary Key and Foreign Key constraints. In Part 2, the same database is altered to insert data from another database into the new database to finish creating the star-shaped database.
Database Security
Click on Database Security below to see a variety of works on the topic
CIS 483 – Basic data protection methods such as discretionary and mandatory access controls, secure database design, data integrity, secure architectures, secure transaction processing, information flow controls, and auditing, copyright and database protection, privacy issues (including employee records and HIPAA). Security models for relational and object-oriented databases, security of databases in a distributed environment, a survey of commercial systems, and research prototypes.
Term Paper – A paper discussing the inadequate cyber security software in databases
Database Security – Basic data protection methods such as discretionary and mandatory access controls, secure database design, data integrity, secure architectures, secure transaction processing, information flow controls, and auditing copyright and database protection, privacy issues (including employee records and
HIPAA). Security models for relational and object-oriented databases,
security of databases in a distributed environment, a survey of commercial
systems, and research prototypes.