King Saud University
  Help (new window)
Search


Guidelines_English_Final
تحميل الدليل التدريبي

أسئلة شائعة


 Principles and Applications of Information Security

 

 

In the Name of Allah most merciful most gracious

 

 King Saud University

College of Arts

Department of Library and Information Sciences

 

 

Course Descriptions

 

Principles and Applications of Information Security LIBR 459

Three hour Credit

Previous Course Required: LIBR 372 Computer Application In Information Organization 

Level Seven

Professor Abdulwahab M. Abalkhail

  SENDME_80@Yahoo.COM

 

Objectives

*To learn methods and tools of Information Security, and ways of protecting hardware and software, and Maintain Information privacy.

 

*To build background regarding ways of maintain and control Information.

 

Terms

*Importance of Information

*Information Threaten

*Information Security Concepts

*Communication Security Concepts

*Information Process Concepts

*Staff Security Concepts

*Information input and output Control

*Emergency plans

 

Course Teaching methods

Lectures, Readings, Discussing, Reports, and practical research

 

100% mark

40 for class works

60 for final Exam

 

 

 

 Course Requirement and Assignment

 Details

Mark

 Activity & Assignment

 1) Search for subject related to information security and right a paper, and be ready for presentation.

2) Search in the internet for Virus and Antivirus, and prepare report…

3) prepare yourself to give next Lecture

15

 

 

 

 

Non-class projects

 

(practical) 

 For presence and coming on time

 5

 Presence

 Will be announced later on

20

 First Exam

 As scheduled

60

 Final Exam

 Final mark for student efforts

100

 Total

 

 

 

  Lectures By Weeks

Weeks

Lecture Subjects

First and Second

  Information Age Security

Third

Materials Security

Fourth

Computer Viruses

Fifth and Sixth

Information Security Systems

Seventh and Eighth

Databases Security

Seventh and Eighth

Information Transfer Networks Security

Seventh and Eighth

Internet & Intranet Networks Security

Ninth and Tenth

Fire Walls

Eleventh

First Exam

Twelve and Thirteen

Coding and Digital Signature

Fourteen and Fifteen

Subjects Discussing & Students Presentation   

 

المراجع الرئيسية المطلوبة Main References (In Arabic)

1-    داود، حسين طاهر. الحاسب وأمن المعلومات. الرياض: معهد الإدارة العامة، 1421هـ.

2-    داود، حسين طاهر. أمن شبكات المعلومات. الرياض: معهد الإدارة العامة، 1425هـ.

 

 

Arabic and English Readings

1-  بيكر هال. سرية وكمال المعلومات: مواجهة انتهاك سرية المعلومات في مراكز الحاسبات الإلكترونية. ترجمة عبدالفتاح الشاعر. الكويت دار البحوث العلمية، 1986م.

2-    الغنيمي، أشرف. نظم الحماية من قراصنة الكمبيوتر. القاهرة: دار الفاروق، 1998م.

3-    لطفي، محمد حسام محمود. الحماية القانونية لبرامج الحاسب الإلكتروني. القاهرة: دار الثقافة، 1987م.

4- Chaney, M. & A. MacDougall, eds. Security and Crime Prevention in Libraries. Burlington, VT: Ashgate Publishing, 1992.

5- Fortson, J. Disaster Planning: A How-to-Do-it Manual for Librarians and Archivist. New York, NY: Neal-Schuman, 1992.

6- Shuman, B. Library Security and Safety Handbook. Chicago, IL: American Library Association, 1999.

  

 

Important Web site Addresses 

1- http://www.cert.org

2- http://www.sans.org

3- http://www.nai.com/default_pgp.asp

4- http://www.yak.net/skey/

5- http://www.utexas.edu/cc/unix/software/npasswd

6- http://srp.stanford.edu/srp

7- http://www.macafee.com/anti-virus/viruses/cordered/default.asp

 

 

 

 

   

King   Saud University. All rights reserved, 2007 | Disclaimer | CiteSeerx