Basta — Database Security (1st edition)
Comprehensive guide to database security: access control, encryption, auditing, and compliance.
📅 Tuesday 13 May 2026 :
Assessment 2 — DB Security & Forensics
will take place in Amphi 4 at 14:00.
Attendance is mandatory.
No make-up session will be offered to absent students.
⚠️ The lecture session and all TP sessions
scheduled on the same day will not take place.
📅 الثلاثاء 13 ماي 2026 :
سيجري التقييم الثاني — أمن قواعد البيانات
في القاعة الكبرى 2 (Amphi 4) على الساعة 14:00.
الحضور إلزامي.
لن يُتاح أي تعويض للطلاب الغائبين.
⚠️ لن تُعقد حصة المحاضرة وكذا حصص الأعمال التطبيقية
المبرمجة في نفس اليوم.
Official space for the Database Security & Forensics (SCBDD) module — Master 1 SI, University of Skikda. This page provides centralized access to lectures, tutorials, labs, pedagogical resources, and module information.
The Database Security & Forensics (SCBDD) module, part of the Master 1 SI (IT Security) program at the University of Skikda, is available on al-moualime.com. It covers advanced methods for securing, auditing, and investigating modern databases. Topics include authentication, access control, encrypted data querying, inter-database communications security, security auditing and testing, incident response, and forensic analysis. The course combines lectures and Practical Work (TP). Assessment: Continuous assessment and exam.
Comprehensive guide to database security: access control, encryption, auditing, and compliance.
PostgreSQL is an open-source Relational Database Management System with advanced security features: role-based access control (RBAC), Row-Level Security (RLS), SSL/TLS encryption, and integration with auditing extensions such as pgAudit.
Open-source extension providing detailed session and object audit logging for PostgreSQL. Essential for regulatory compliance (GDPR, PCI-DSS, SOX) and forensic investigation.
Open-source tool for capturing and analyzing network traffic. Used in this module to inspect database communication protocols, detect unencrypted connections, and support forensic network analysis.
General introduction to the Database Security & Forensics module: objectives, organization, assessment methods, and overview of the topics covered.
This chapter introduces the fundamentals of information security applied to databases: threat landscape, CIA triad (Confidentiality, Integrity, Availability), attack vectors, and defense-in-depth strategies.
Takeaway: Database security is a multi-layered discipline — no single measure is sufficient.
Before the next lecture: Review the Chapter 1 PDF and research a recent database breach case study.
Upcoming subjects:
Written exam covering database security principles, privilege management, and forensic analysis techniques.