WM283-15 Databases and Information Management
Introductory description
Databases are the backbone of modern information systems, serving as repositories for vast amounts of data. They provide structured organization and efficient retrieval, making them essential in various industries, from business and healthcare to technology and research. Understanding databases is crucial for effective data management and decision-making. In this module, students will be introduced to the essential concepts of databases, data modelling, and optimisation. This knowledge will empower students to craft efficient databases for superior information management. As our digital world becomes increasingly data-driven, protecting this data from cyber threats is of paramount importance. Therefore, students will give particular attention to database security and cybersecurity, equipping them with the expertise needed to safeguard valuable data and defend against potential threats. From understanding Database Management Systems (DBMS) and data modelling to mastering Structured Query Language (SQL) and optimizing queries, students will gain indispensable skills for designing and maintaining robust databases.
Module aims
This module is designed to provide students with a broader understanding of the pivotal role that databases play in contemporary information systems. It will cover effective data modelling, information management, database security, and their practical applications in real-world scenarios. Additionally, the module seeks to foster the integration of diverse data sources, ensuring data integrity and consistency, thereby nurturing a comprehensive understanding of information repositories. It emphasizes compliance with standards such as GDPR and the implementation of robust controls.
Outline syllabus
This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.
The content of this course will be presented with a primary focus on cyber security principles and perspectives:
Databases and infomration management terms and concepts.
Database management systems (DBMS).
DBMS architecture.
Data modelling techniques.
Entity-Relationship Diagrams (ERDs).
Normalization and database design principles.
Structured Query Language (SQL) fundamentals.
Optimisation techniques for query performance.
Common database vulnerabilities.
Strategies for cyber threat prevention.
Learning outcomes
By the end of the module, students should be able to:
- Design and construct a data model that fulfils specific information management needs
- Assess the potential cyber security impacts resulting from information management in a specific scenario.
- Conduct a critical analysis of database security, identifying weaknesses, and implementing effective measures to enhance it.
- Demonstrate the deployment, configuration, and management of database security, including user administration and policy optimisation.
Indicative reading list
Connolly, Thomas and Begg, Carolyn, “Database Systems: A Practical Approach to Design, Implementation, and Management”, 6 Ed, Pearson (2014)
Cox, Sharon A., “Managing Information in Organizations: A Practical Guide to Implementing an Information Management Strategy”, Palgrave Macmillan (2014)
Hills, Ted, “NoSQL and SQL Data Modeling: Bringing Together Data, Semantics, and Software”, Technics Publications (2016)
View reading list on Talis Aspire
Subject specific skills
This module enables students to develop a comprehensive understanding of the fundamentals of databases and information management. Furthermore, in addition to gaining expertise in aspects like database design, data modelling, query construction, data retrieval techniques, access control, and authorisation methods, students also will develop their capability to implement security policies and protocols within database environments.
Transferable skills
Information literacy
Critical thinking
problem-solving
written communication
Study time
Type | Required |
---|---|
Supervised practical classes | 18 sessions of 2 hours (24%) |
Private study | 54 hours (36%) |
Assessment | 60 hours (40%) |
Total | 150 hours |
Private study description
Engage in individual tasks outside of workshop hours that involve following up on activities initiated during previous workshops or preparing for upcoming workshop sessions.
Costs
No further costs have been identified for this module.
You must pass all assessment components to pass the module.
Assessment group A
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Assessment component |
|||
Coursework | 50% | 30 hours | Yes (extension) |
The report outlines the execution of a specific database type (e.g., relational, NoSQL, graph), encompassing the development of suitable techniques for data population, querying, and data modification |
|||
Reassessment component is the same |
|||
Assessment component |
|||
Coursework | 50% | 30 hours | Yes (extension) |
The report mandates a thorough and critical assessment by the student, centred on the security controls implemented to protect certain aspects of the information lifecycle process by solving a case study provided. |
|||
Reassessment component is the same |
Feedback on assessment
Each assignment will receive written feedback, and during tutorial sessions, verbal feedback will be provided. Solutions to tutorial questions will also be made available, and summative feedback will be given for assignments and the exam.
Courses
This module is Core for:
-
UWMA-H651 Undergraduate Cyber Security
- Year 2 of H651 Cyber Security
- Year 2 of H651 Cyber Security
- Year 2 of H651 Cyber Security