Course Portfolio INFO4441 Fundamentals of Information Security

advertisement
College of Arts and Social Sciences
Department of Information studies
Course Portfolio
INFO4441
Fundamentals of Information Security
Period: [Fall -2014]
[2015]
Course File
I. COURSE FILE SUMMARY
1. COURSE INFORMATION
College/Institute/Centre
COLLEGE OF ARTS AND SOCIAL SCIENCES
Department
Department of Information Studies
Program Title
Information Studies
Semester\Year
Program Code
English
Course Title
Course Code
Fundamentals of
Information Security
INFO4441
Arabic
‫أساسيات أمن المعلومات‬
Course Type
Pre Requisites
None
Teaching Language
Arabic
Credit Hours
Teaching Hours
Teaching Weeks
3
Lecture
---3-- (Weekly)
Practical/Fieldwork ----- (Weekly)
--14---
Number of students
Lecture
Practical/Fieldwork
Number of Student dropped
1
Total
--3---
0
2. COURSE DESCRIPTION
ENGLISH COURSE DESCRIPTION
ARABIC COURSE DESCRIPTION
The purpose of the course is to enable
students to examine major principles and
issues related to Information Security. It puts
emphasis on the origins, evaluation, and
current status of these issues. Issues including
information
privacy,
security
and
confidentiality,
access
anonymity
rights,
and
identity, security models, and issues related to
operating system integrity will be discussed.
Distributed systems security is considered
from the perspective of the World Wide Web
and the Internet in terms of TCP/IP security.
Multi-level security in databases relative to
concurrency
control
and
object-oriented
systems are explored.
3. COURSE AIM
The main objective of this course is to provide students with an overview of major issues
related to Information Security.
4. COURSE OBJECTIVES
•
Understand the principles of information security
•
Develop knowledge in evaluation of information security systems
•
Explore distributed systems security from the perspective of the World Wide Web
and the Internet in terms of TCP/IP security
•
Familiarize students with the literature related to the course topic.
2
5. COURSE INTENDED LEARNING OUTCOMES
By the end of this course, students should be able to:
1. Understand the principles of information security
2. Develop knowledge in evaluation of information security systems
3. Explore distributed systems security from the perspective of the World Wide Web
and the Internet in terms of TCP/IP security
4. Familiarize students with the literature related to the course topic.
6. LECTURES SCHEDULE
WEEK
TOPIC
1&2
 Course Overview and Introduction: content, schedule, assignments,
and grading.
3, 4 & 5


Access to Information: Issues and Challenges
Introduction to Information Security
 Definitions of Information Security Information Security vs.
Computer Security
6, 7 & 8
9 & 10

The Need for Information Security

Legal, Ethical, and Professional Issues in Information Security

Library principles and their relationship to information security
 Security Awareness Programs
 Information Systems Security in Libraries

The Library Information Systems Security

Assessment Model (LISSAM)

Mid-term Examination

Security and Digital Libraries

Multi-level Security in Databases

RDA
3
11, 12, &
13

Security and The Internet

Access Control

Privacy

Social Networks
o Facebook
o LinkedIn

14 & 15
Research Gate

Future Trend in Information Security

Revising and Clearing out
7. TEACHING STRATEGIES AND TECHNOLOGY APPLICATION
Teaching Method

Lectures,

Experiential exercises, and
Teaching Media


Videos
Power-point Presentations
8. GRADING AND ASSESSMENT
The final grade will be determined numerically by averaging your scores with the
following weights:

Class Participation 15%

Assignment I: Libraries Information Security Policy Analysis (20%) 1500 words

Assignment II: Future Trends (15%) 2000 words

Assignment III: Team Presentation: 10%

Final Exam: 40%
4
‫‪9. COURSE RULES‬‬
‫‪Attendance‬‬
‫‪Attendance at class is mandatory. Course Instructors should keep attendance records. An‬‬
‫‪"absentee warning notice" will be issued if a student is absent for:‬‬
‫‪• More than 10% in courses with less than 75 total contact hours.‬‬
‫‪• More than 5% in courses with 75 or more total contact hours.‬‬
‫‪An "absentee withdrawal notice" will be issued and the student will be deemed to have‬‬
‫‪withdrawn from the course with an 'FW' grade if a student is absent for:‬‬
‫‪• More than 20% in courses with less than 75 total contact hours.‬‬
‫‪• More than 15% in courses with 75 to 150 total contact hours.‬‬
‫‪• More than 10% of total contact hours for courses with more than 150 total‬‬
‫‪contact hours.‬‬
‫‪10. INSTRUCTIONAL MATERIALS‬‬
‫‪Articles‬‬
‫‪ .1‬أحمد‪ ،‬فايزة دسوقي (‪ .)2009‬سياسات الخصوصية في محركات البحث‪ :‬دراسة تحليلية‬
‫مقارنة‪ .‬دراسات المعلومات‪.80-49 ،5 ،‬‬
‫‪ .2‬بوعزة‪ ،‬عبد المجيد صالح (‪ .)2010‬المكتبات الرقمية وبعض القضايا الفكرية‪ .‬مجلة مكتبة‬
‫الملك فهد الوطنية‪.100-77 ،)1 (11 ،‬‬
‫‪.3‬‬
‫بوعناقة‪ ،‬سعاد (‪ .)2009‬دور العموميات الخالقة في دعم حركة الوصول الحر في الوطن‬
‫العربي‪ .‬في وقائع المؤتمر ‪ 20‬لالتحاد العربي للمكتبات والمعلومات حول " نحو جيل جديد‬
‫من نظم المعلومات والمتخصصين‪ :‬رؤية مستقبلية"‪ ،‬الدار البيضاء ‪ 11-9‬ديسمبر ‪.2009‬‬
‫الرياض‪ :‬مكتبة الملك عبد العزيز العامة‪.‬‬
‫‪ .4‬عبد هللا‪ ،‬يوسف عيسى (‪ .)2008‬حقوق الملكية الفكرية لألوعية اإللكترونية‪ .‬المعلوماتية‪،‬‬
‫‪.14-12 ،22‬‬
‫‪ .5‬عرب‪ ،‬يونس (‪ .)2004‬التدابير التشريعية العربية لحماية المعلومات والمصنفات الرقمية‪.‬‬
‫الندوة العلمية الخامسة حول التوثيق والمعلومات في بناء المجتمع العربي‪ ،‬النادي العربي‬
‫من‬
‫‪،2009‬‬
‫‪،10‬‬
‫سبتمبر‬
‫اإلتاحة‬
‫تاريخ‬
‫دمشق‪.‬‬
‫للمعلومات‪،‬‬
‫‪http://doc.abhatoo.net.ma/IMG/doc/dro34.doc‬‬
‫‪ .6‬عرب‪ ،‬يونس (‪ .)2005‬النظام القانوني للملكية الفكرية‪ .‬تاريخ اإلتاحة سبتمبر ‪،2009 ،10‬‬
‫‪http://doc.abhatoo.net.ma/IMG/doc/dro23.doc‬‬
‫من‬
‫‪ .7‬الشريف‪ ،‬هبة (‪ .)2009‬األخالقيات المهنية للمشتعلين بمجال المكتبات والمعلومات في ظل‬
‫من‬
‫‪،2009‬‬
‫‪،10‬‬
‫سبتمبر‬
‫اإلتاحة‬
‫مجتمع المعلومات‪ .‬تاريخ‬
‫‪5‬‬
http://www.cybrarians.info/index.php?option=com_content&view=art
icle&id=384:2009-05-11-00-48-56&catid=47:2009&Itemid=82
‫ مجلة مكتبة‬.‫ أخالقيات مجتمع المعلومات في عصر اإلنترنت‬.)2007( ‫ صباح محمد‬،‫ كلو‬.8
.305-186 ،)1(13 ،‫الملك فهد الوطنية‬
-22 ،22 ،‫ المعلوماتية‬.‫ أهمية أمن المعلومات في مجتمعنا‬.)2008( ‫ عبد هللا يحي‬،‫ المبارك‬.9
.24
،9 ،‫ القبس‬.‫ الهاكرز يحمون األنظمة المعلوماتية من القرصنة‬.)2008( ‫ جان مارك‬،‫ ماناش‬.10
.49-47
11. Al-Suqri, M. N., & Fatuyi, E. O. (2009). Information Security and Privacy in
Digital Libraries. In Y. Theng, S. Foo, D. Goh, & J. Na, (Eds), Handbook of
Research on Digital Libraries: Design, Development, and Impact (pp. 8-15). New
York, IGI Global.
12. Al-Suqri, M. N., & Fatuyi, E. O. (2012). Security and Privacy in Digital Libraries:
Challenges, Opportunities and Prospects. International Journal of Digital Library
Systems (IJDLS), 3(4), 54-61.
13. Arifa, K. (2003). Ethical Issues in Cryptography and Information Security:
Concerns for Digital Libraries. Retrieved August 22, 2009, from
http://findarticles.com/p/articles/mi_m0HKV/is_1_9/ai_65014444/?tag=rbxcra.2.a
11
14. Birnbaum, J. S. (2004). Cybersecurity considerations for digital libraries in an era of
pervasive computing. In Proceedings ACM/IEEE Conference on Digital Libraries
(JCDL’04) (pp. 169-169). New York, NY: ACM
15. Borgman, C. L. (2000). From Gutenberg to the global information infrastructure: Access
to information in the networked world. Cambridge, MA: MIT Press.
16. Bowers, S. (2006). Privacy and library records. Journal of Academic Librarianship,
32(4), 377–383. doi:10.1016/j.acalib.2006.03.005
17. Casey, M., & Savastinuk, L. (2006, September 1). Library 2.0. Library Journal. Retrieved
August 29, 2013, from http://lj.libraryjournal.com/2010/05/ technology/library-2-0/
18. Digital Library Federation. (n.d.). What is digital library? Retrieved April 12, 2007, from
www.clir. org/diglib
19. Ershova,
T. V., & Hohlov, Y. E. (2001). Integration of Russian electronic information
resources of social value on the basis of DL concept. Russian Digital Libraries Journal,
4(1), 32–41.
20. Emmans, C. (2000). Internet ethics. Technos. Retrieved September 10, 2009,
from
6
21. Carbo, T., & Almagno, S. (2001). Information ethics: The duty, privilege and
challenge
of educating information professionals-University of
Pennsylvania. Library
Trends. Retrieved September 10, 2009, from
http://findarticles.com/p/articles/mi_m1387is_3_49/ai_75278310/?tag=rbxcra.2.a1
1
Attachment
II.
III.
IV.
V.
VI.
VII.
VIII.
LECTURES
LECTURE NOTES/HAND-OUTS
EXAMS SAMPLE
A SAMPLE OF STUDENTS’ ANSWERS
A SAMPLE OF EXERCISES AND STUDENTS’ ANSWERS
A SAMPLE OF ASSIGNMENTS AND STUDENTS’ ACTIVITIES
RESULTS AND GRADES
7
Download