There is a need to investigate Information technology (IT) Companies in Saudi Arabia for Risk Management for two reasons. Firstly, it is obvious from the literature that one reason for failure of…
Oblivious Random-Access Memory (ORAM) is becoming a fundamental component for modern outsourced storages as a cryptographic primitive to prevent information leakage from a user access pattern. The…
In this paper, we propose an advanced implementation of Path ORAM to hide the access pattern to outsourced data into the cloud. This implementation takes advantage of eventual data locality and…
This course covers issues concerning management of risks, which both digital information and network assets in an organization are exposed to, and provides information and guidelines that can help…
This course provides an introduction to the fundamental principles of information technology and its pillars. It introduces students to the discipline of IT and its applications in industry.…
This course defines information security. Topics include security services and its mechanisms, such as confidentiality, integrity, availability and non-repudiation, security policies,…