Database Security & Forensics

Master 1 SI

Official space for the Database Security & Forensics (SCBDD) module — Master 1 SI, University of Skikda. This page provides centralized access to lectures, tutorials, labs, pedagogical resources, and module information.

Official Syllabus


Official syllabus — SI

Track — Computer Security

The Database Security & Forensics (SCBDD) module, part of the Master 1 SI (IT Security) program at the University of Skikda, is available on al-moualime.com. It covers advanced methods for securing, auditing, and investigating modern databases. Topics include authentication, access control, encrypted data querying, inter-database communications security, security auditing and testing, incident response, and forensic analysis. The course combines lectures and Practical Work (TP). Assessment: Continuous assessment and exam.

Resources


Software


pgAudit — PostgreSQL Audit Extension

Open-source extension providing detailed session and object audit logging for PostgreSQL. Essential for regulatory compliance (GDPR, PCI-DSS, SOX) and forensic investigation.

Wireshark — Network Protocol Analyzer

Open-source tool for capturing and analyzing network traffic. Used in this module to inspect database communication protocols, detect unencrypted connections, and support forensic network analysis.

Lectures


Introduction FR

General introduction to the Database Security & Forensics module: objectives, organization, assessment methods, and overview of the topics covered.

Chapter 1 — Security and Information Technology FR

This chapter introduces the fundamentals of information security applied to databases: threat landscape, CIA triad (Confidentiality, Integrity, Availability), attack vectors, and defense-in-depth strategies.

  • Objective: Understand the security challenges of modern information systems and identify the main categories of threats and countermeasures.
  • Concepts to know: Internal vs. external threats; privilege escalation; data breach lifecycle; security policies and standards.
  • Key ideas: CIA triad; defense in depth; principle of least privilege; threat modeling; OWASP Top 10 for databases.

Takeaway: Database security is a multi-layered discipline — no single measure is sufficient.

Before the next lecture: Review the Chapter 1 PDF and research a recent database breach case study.

Upcoming subjects:

Authentication Soon
Access Control Soon
Querying Encrypted Data Soon
Securing DB Communications Soon
Security Auditing Soon
Security Testing Soon
Incident Response Soon
Forensic Analysis Soon

Practical Work (TP)


Assessments