College of Arts and Social Sciences Department of Information studies Course Portfolio INFO4441 Fundamentals of Information Security Period: [Fall -2014] [2015] Course File I. COURSE FILE SUMMARY 1. COURSE INFORMATION College/Institute/Centre COLLEGE OF ARTS AND SOCIAL SCIENCES Department Department of Information Studies Program Title Information Studies Semester\Year Program Code English Course Title Course Code Fundamentals of Information Security INFO4441 Arabic أساسيات أمن المعلومات Course Type Pre Requisites None Teaching Language Arabic Credit Hours Teaching Hours Teaching Weeks 3 Lecture ---3-- (Weekly) Practical/Fieldwork ----- (Weekly) --14--- Number of students Lecture Practical/Fieldwork Number of Student dropped 1 Total --3--- 0 2. COURSE DESCRIPTION ENGLISH COURSE DESCRIPTION ARABIC COURSE DESCRIPTION The purpose of the course is to enable students to examine major principles and issues related to Information Security. It puts emphasis on the origins, evaluation, and current status of these issues. Issues including information privacy, security and confidentiality, access anonymity rights, and identity, security models, and issues related to operating system integrity will be discussed. Distributed systems security is considered from the perspective of the World Wide Web and the Internet in terms of TCP/IP security. Multi-level security in databases relative to concurrency control and object-oriented systems are explored. 3. COURSE AIM The main objective of this course is to provide students with an overview of major issues related to Information Security. 4. COURSE OBJECTIVES • Understand the principles of information security • Develop knowledge in evaluation of information security systems • Explore distributed systems security from the perspective of the World Wide Web and the Internet in terms of TCP/IP security • Familiarize students with the literature related to the course topic. 2 5. COURSE INTENDED LEARNING OUTCOMES By the end of this course, students should be able to: 1. Understand the principles of information security 2. Develop knowledge in evaluation of information security systems 3. Explore distributed systems security from the perspective of the World Wide Web and the Internet in terms of TCP/IP security 4. Familiarize students with the literature related to the course topic. 6. LECTURES SCHEDULE WEEK TOPIC 1&2 Course Overview and Introduction: content, schedule, assignments, and grading. 3, 4 & 5 Access to Information: Issues and Challenges Introduction to Information Security Definitions of Information Security Information Security vs. Computer Security 6, 7 & 8 9 & 10 The Need for Information Security Legal, Ethical, and Professional Issues in Information Security Library principles and their relationship to information security Security Awareness Programs Information Systems Security in Libraries The Library Information Systems Security Assessment Model (LISSAM) Mid-term Examination Security and Digital Libraries Multi-level Security in Databases RDA 3 11, 12, & 13 Security and The Internet Access Control Privacy Social Networks o Facebook o LinkedIn 14 & 15 Research Gate Future Trend in Information Security Revising and Clearing out 7. TEACHING STRATEGIES AND TECHNOLOGY APPLICATION Teaching Method Lectures, Experiential exercises, and Teaching Media Videos Power-point Presentations 8. GRADING AND ASSESSMENT The final grade will be determined numerically by averaging your scores with the following weights: Class Participation 15% Assignment I: Libraries Information Security Policy Analysis (20%) 1500 words Assignment II: Future Trends (15%) 2000 words Assignment III: Team Presentation: 10% Final Exam: 40% 4 9. COURSE RULES Attendance Attendance at class is mandatory. Course Instructors should keep attendance records. An "absentee warning notice" will be issued if a student is absent for: • More than 10% in courses with less than 75 total contact hours. • More than 5% in courses with 75 or more total contact hours. An "absentee withdrawal notice" will be issued and the student will be deemed to have withdrawn from the course with an 'FW' grade if a student is absent for: • More than 20% in courses with less than 75 total contact hours. • More than 15% in courses with 75 to 150 total contact hours. • More than 10% of total contact hours for courses with more than 150 total contact hours. 10. INSTRUCTIONAL MATERIALS Articles .1أحمد ،فايزة دسوقي ( .)2009سياسات الخصوصية في محركات البحث :دراسة تحليلية مقارنة .دراسات المعلومات.80-49 ،5 ، .2بوعزة ،عبد المجيد صالح ( .)2010المكتبات الرقمية وبعض القضايا الفكرية .مجلة مكتبة الملك فهد الوطنية.100-77 ،)1 (11 ، .3 بوعناقة ،سعاد ( .)2009دور العموميات الخالقة في دعم حركة الوصول الحر في الوطن العربي .في وقائع المؤتمر 20لالتحاد العربي للمكتبات والمعلومات حول " نحو جيل جديد من نظم المعلومات والمتخصصين :رؤية مستقبلية" ،الدار البيضاء 11-9ديسمبر .2009 الرياض :مكتبة الملك عبد العزيز العامة. .4عبد هللا ،يوسف عيسى ( .)2008حقوق الملكية الفكرية لألوعية اإللكترونية .المعلوماتية، .14-12 ،22 .5عرب ،يونس ( .)2004التدابير التشريعية العربية لحماية المعلومات والمصنفات الرقمية. الندوة العلمية الخامسة حول التوثيق والمعلومات في بناء المجتمع العربي ،النادي العربي من ،2009 ،10 سبتمبر اإلتاحة تاريخ دمشق. للمعلومات، http://doc.abhatoo.net.ma/IMG/doc/dro34.doc .6عرب ،يونس ( .)2005النظام القانوني للملكية الفكرية .تاريخ اإلتاحة سبتمبر ،2009 ،10 http://doc.abhatoo.net.ma/IMG/doc/dro23.doc من .7الشريف ،هبة ( .)2009األخالقيات المهنية للمشتعلين بمجال المكتبات والمعلومات في ظل من ،2009 ،10 سبتمبر اإلتاحة مجتمع المعلومات .تاريخ 5 http://www.cybrarians.info/index.php?option=com_content&view=art icle&id=384:2009-05-11-00-48-56&catid=47:2009&Itemid=82 مجلة مكتبة. أخالقيات مجتمع المعلومات في عصر اإلنترنت.)2007( صباح محمد، كلو.8 .305-186 ،)1(13 ،الملك فهد الوطنية -22 ،22 ، المعلوماتية. أهمية أمن المعلومات في مجتمعنا.)2008( عبد هللا يحي، المبارك.9 .24 ،9 ، القبس. الهاكرز يحمون األنظمة المعلوماتية من القرصنة.)2008( جان مارك، ماناش.10 .49-47 11. Al-Suqri, M. N., & Fatuyi, E. O. (2009). Information Security and Privacy in Digital Libraries. In Y. Theng, S. Foo, D. Goh, & J. Na, (Eds), Handbook of Research on Digital Libraries: Design, Development, and Impact (pp. 8-15). New York, IGI Global. 12. Al-Suqri, M. N., & Fatuyi, E. O. (2012). Security and Privacy in Digital Libraries: Challenges, Opportunities and Prospects. International Journal of Digital Library Systems (IJDLS), 3(4), 54-61. 13. Arifa, K. (2003). Ethical Issues in Cryptography and Information Security: Concerns for Digital Libraries. Retrieved August 22, 2009, from http://findarticles.com/p/articles/mi_m0HKV/is_1_9/ai_65014444/?tag=rbxcra.2.a 11 14. Birnbaum, J. S. (2004). Cybersecurity considerations for digital libraries in an era of pervasive computing. In Proceedings ACM/IEEE Conference on Digital Libraries (JCDL’04) (pp. 169-169). New York, NY: ACM 15. Borgman, C. L. (2000). From Gutenberg to the global information infrastructure: Access to information in the networked world. Cambridge, MA: MIT Press. 16. Bowers, S. (2006). Privacy and library records. Journal of Academic Librarianship, 32(4), 377–383. doi:10.1016/j.acalib.2006.03.005 17. Casey, M., & Savastinuk, L. (2006, September 1). Library 2.0. Library Journal. Retrieved August 29, 2013, from http://lj.libraryjournal.com/2010/05/ technology/library-2-0/ 18. Digital Library Federation. (n.d.). What is digital library? Retrieved April 12, 2007, from www.clir. org/diglib 19. Ershova, T. V., & Hohlov, Y. E. (2001). Integration of Russian electronic information resources of social value on the basis of DL concept. Russian Digital Libraries Journal, 4(1), 32–41. 20. Emmans, C. (2000). Internet ethics. Technos. Retrieved September 10, 2009, from 6 21. Carbo, T., & Almagno, S. (2001). Information ethics: The duty, privilege and challenge of educating information professionals-University of Pennsylvania. Library Trends. Retrieved September 10, 2009, from http://findarticles.com/p/articles/mi_m1387is_3_49/ai_75278310/?tag=rbxcra.2.a1 1 Attachment II. III. IV. V. VI. VII. VIII. LECTURES LECTURE NOTES/HAND-OUTS EXAMS SAMPLE A SAMPLE OF STUDENTS’ ANSWERS A SAMPLE OF EXERCISES AND STUDENTS’ ANSWERS A SAMPLE OF ASSIGNMENTS AND STUDENTS’ ACTIVITIES RESULTS AND GRADES 7