Untitled Quiz
13 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

ما هي البنية النجمية؟

  • تجمع الأجهزة في مجموعات من البنيات النجمية ثم تربط هذه البنية النجمية على شكل شجرة ويكون في هذه الحالة هنالك موزع مركزي مرتبط بموزعات فرعية تربط فروع الشبكة
  • تربط جميع الأجهزة بموزع مركزي. (correct)
  • تربط كل جهاز بالذي يليه بواسطة كيبل واحد مشترك ثم يربط الجهاز الأخير بالجهاز الأول لتشكيل حلقة من الأجهزة.
  • تربط جميع الأجهزة بخط كيبل نقل واحد.
  • من هم المستخدمون؟

  • هم الأشخاص الذين يربطون جميع الأجهزة بخط كيبل نقل واحد
  • هم من ينشئون البرامج والأنظمة في نظام المعلومات
  • هو من يعمل على المكونات المادية ويتعامل مع البرامج، وهم المحرك الحقيقي في منظومة أنظمة المعلومات. (correct)
  • هو من ينقل البيانات من جهاز إلى آخر
  • ما هو مفهوم "Information Security"؟

  • هو عبارة عن مجموعة من البرامج لحماية المعلومات
  • هو العلم الذي يبحث في نظريات واستراتيجيات توفير الحماية للمعلومات من المخاطر التي تهددها. (correct)
  • هو عبارة عن مجموعة من التعليمات لحماية الأجهزة
  • هو العلم المعني بالمحافظة على المعلومات.
  • ما هي أهمية أمن المعلومات؟

    <p>كل ما سبق</p> Signup and view all the answers

    ما هي أنواع الشبكات من حيث المساحة الجغرافية؟

    <p>شبكات الحاسب الآلي المحلية (LAN) وشبكات الحاسب الآلي الواسعة (WAN)</p> Signup and view all the answers

    ما هو مفهوم "Intranet"؟

    <p>هي شبكة حاسب آلي محلية خاصة بالمؤسسة وتستخدم تقنيات وبروتوكول الانترنت.</p> Signup and view all the answers

    ماذا تُعني "Data"؟

    <p>مجموعة من الأرقام الثنائية سواء أكانت تمثل أرقاما أم حروفا أو رموزا أم أي خليط منها.</p> Signup and view all the answers

    ما هي أنواع التهديدات المعلوماتية؟

    <p>تهديدات فنية وتهديدات بشرية وتهديدات طبيعية</p> Signup and view all the answers

    ماذا تُعني "Information"؟

    <p>هي البيانات بعد معالجتها ووضعها بشكل مفهوم وذات معنى.</p> Signup and view all the answers

    ما هي أهم مميزات الحوسبة السحابية؟

    <p>توفير الأنظمة والبرامج والعمليات الرقمية كخدمات</p> Signup and view all the answers

    تعتبر أمن المعلومات حلا اختيارياً للمؤسسات - وليس ضرورة

    <p>False</p> Signup and view all the answers

    يُعدّ المستخدمون الحلقة الأضعف في برنامج أمن المعلومات .

    <p>True</p> Signup and view all the answers

    ما هي أهم سياسات أمن المعلومات؟

    <p>بالتعريف بأهم السياسات الأمنية المتعلقة بالمحافظة والحماية.</p> Signup and view all the answers

    Study Notes

    General Information

    • Course Title: أساسيات أمن المعلومات (Fundamentals of Information Security)
    • Course Code: BX-103, BN-227
    • Instructor: د. بشری شریف
    • Term: نوفمبر 2024

    Instructor Information

    • Dr. Bushra Shareef holds a Bachelor's degree in Information Technology from King Abdulaziz University, Jeddah, specializing in Software Engineering.
    • She holds a Master's and a Ph.D. in Information Technology from the Arab Academy for Science, Technology and Maritime Transport, specializing in Information Security and Blockchain Technology,including Machine Learning (ML) algorithms.

    Contact Information

    Course Content (Information Security)

    • Definition: Information security is the science that studies the theories and strategies to protect information from the threats which threaten it and from the acts that harm it.
    • Technical Aspect: Methods, tools and procedures for ensuring that information is protected from internal and external dangers.

    Learning Objectives

    • Overview of fundamental concepts and terminology related to information security.
    • Methods for maintaining the security of various technologies (hardware, software, networks).
    • Covering fundamental topics like symmetric and asymmetric encryption algorithms, various security threats and protection measures.
    • Understanding key security policies for protection.
    • Exploring digital crime investigations and documenting evidence for identifying cyberattacks against organizations.

    Schedule

    • First 6 Weeks: Fundamental concepts, terminologies related to information security, and hardware-related information.
    • Weeks 7 - 11: Security policies, related to both physical and software aspects of information systems.
    • Weeks 12-16: Digital evidence documentation, and the science of computer forensics.
    • Final Week(s): Final Exam

    Resources (Textbooks and References)

    • Textbook: أمن المعلومات - د ذيب القحطاني, King Abdulaziz University (2015)
    • Additional Resources: Network and Infrastructure security by Dr. Ghassan Saba (2018)
    • Other References: -Cryptography and Network Security by Stallings (4th Ed., 2006) -Fundamentals of Information Systems Security by Kim & Solomon (3rd Ed., 2018)

    Evaluation

    • Attendance: 20%
    • Assignments: 20%
    • Midterm Exam: 20%
    • Final Exam: 40%

    Chapter 1: Introduction to Information Security

    • Introduction (1.1): Definitions of Data & Information
      • Data: Raw, unprocessed figures, symbols, or characters.
      • Information: Processed data, organized in a meaningful way.
    • System Components (2.1):
      • الأجهزة: المكونات المادية
      • Software: Programs and applications
      • البيانات: بيانات منظمة (بيانات منظمة) وغير منظمة (بيانات غير منظمة).
      • المستخدمون: الأفراد الذين يتفاعلون مع النظام.
      • الشبكات: أنظمة التوصيل.
      • الإجراءات: التعليمات والعمليات

    Chapter 2: Components of Information Systems

    (Further elaborates on the 6 components mentioned above, plus their relationship: Hardware, Software, Data, Users, Networks, Procedures.)

    Chapter 2-1: Hardware Components

    • Description of various hardware components (computers, printers, routers, switches, modems, hard drives, etc.).

    Chapter 2-2-1: Software Components

    • Definition of operating systems (OS) and their roles (managing hardware, running applications, memory management, I/O management, data/file management & network communication).
    • Description of applications (software that performs specific tasks).

    Chapter 3-2-1: Data Types

    • Structured data (databases) and unstructured data (files).

    Chapter 4-2-1: Users

    • Users are the active element in Information Systems.

    Chapter 5-2-1: Procedures

    • Procedures are defined as instructions/commands for accomplishing specific tasks.

    Chapter 6-2-1: Networks

    • Definition of computer networks and components.

    Chapter 6-2-1-1: Network Topologies

    • Types of network topologies: Bus Topology, Star Topology, Ring Topology, and Star-Tree Topology.
    • Definitions of Local Area Networks (LANs) and Wide Area Networks (WANs).

    Chapter 6-2-1-2: Network Types (Centralization)

    • Client/Server Networks
    • Peer-to-Peer Networks

    Chapter 6-2-1-3: Internet

    • Definitions of the Internet and access methods (Dial-up, DSL, Wi-Fi, LAN, Satellite).

    Chapter 6-2-1-4: Internet Components

    • Browsers and their role in internet access.
    • HTTP and other internet protocols like URLs (protocol, domain name, top-level domain).

    Chapter 6-2-1-5: Intranet

    • Definition of intranet as a private local area network.

    Chapter 6-2-1-6: Extranet

    • Definition of extranet as connection between multiple intranets.

    Chapter 7-6-2-1: Cloud Computing

    • Definition of cloud computing as a service-based delivery model for resources.

    Chapter 8-6-2-1: Network Layers

    • OSI model and its seven layers (application layer, presentation layer, session layer, transport layer, network layer, data link layer, physical layer.)
    • Description of TCP/IP protocol suite and its roles in network communication.

    Chapter 1-2: Why Information Security?

    • Importance of information security as a necessity, not an option.
    • Threats to Information Systems (as a cause for security needs).

    Chapter 2-2: Definition of Information Security

    • Definition of Information Security emphasizing protection from harm of all forms; unauthorized access; and enabling uninterrupted operation.

    Chapter 2-4: Need for Information Security

    • Need for information security due to critical assets (data centers, databases, servers, storage, websites, etc.).
    • Importance to the organization's operations.
    • Importance for users receiving services.
    • Effects of remote services and remote working.
    • Need to understand institutional capabilities to protect against various threats.

    Chapter 4-2: Threats to Information Systems

    • Classification of threats: technical, human, environmental (natural disasters).

    Chapter 1-4-2: Technical Threats

    • Design and operation flaws (e.g., open ports, incorrect data backups, data fragmentation).

    Chapter 2-4-2: Human Threats

    • Malicious users and staff; unaware users and staff; malicious organizations; hardware/software vendors; external engineers, technicians, and support personnel.

    Chapter 3-4-2: Natural Threats

    • Natural disasters (earthquakes, floods, fires, etc.).

    Chapter 5-2: Cyberattacks and Security Needs

    • Types of cyberattacks: Malware, Backdoors, Password cracking, Brute-Force attacks, Man-in-the-Middle attacks, Denial-of-Service attacks, Spoofing and other deception techniques.

    Chapter 5-2-x: Advanced Cyber Threats

    • Other threats, such as: Dictionary Attacks, E-mail Bombing, Sniffing, Social Engineering, Shoulder Surfing, and Side-Channel Attacks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    More Like This

    Untitled Quiz
    6 questions

    Untitled Quiz

    AdoredHealing avatar
    AdoredHealing
    Untitled Quiz
    19 questions

    Untitled Quiz

    TalentedFantasy1640 avatar
    TalentedFantasy1640
    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    50 questions

    Untitled Quiz

    JoyousSulfur avatar
    JoyousSulfur
    Use Quizgecko on...
    Browser
    Browser