Loading...
2025/08/23 - 03:32 PM01/Rabi’ Al-Awwal/1447 - 18:32
Was this page useful?
0 % of users said yes from 0 feedbacks.
Please tell us why(you can select multiple options)
Within the direction of the Deanship of Information Technology to provide protection for information assets from the risks that may threaten them, the Department has established the Information Security Department, and the main goal of the Department is to create a safe work environment by ensuring the protection of information assets and the continuous assurance of their confidentiality, integrity and availability. Based on the latest and best practices, the administration consists of four main departments:
1- Section: Application and Hardware Security and Access Control
His job :
Ensuring the protection of information assets at the University of Tabuk proactively from electronic threats, and to prevent the occurrence of cybersecurity incidents or their recurrence in line with the risk management policy at the University of Tabuk.
His tasks:
2- Section: Security Operations Center
And its spectrum:
Monitor, detect and monitor ongoing work, discover any security incidents, and report suspicious incidents or unauthorized entries as soon as possible.
His tasks:
3- Section: Responding to Security Incidents
His job:
Prompt response and deal when a cybersecurity incident occurs, reduce its impact and ensure the speed of returning assets to normal operations as soon as possible The assets include technology and information.
His tasks:
• Incident management planning and response.
• Business continuity planning.
• Plan for disaster recovery.
• Conducting tests, exercises and rehearsals on all response plans.
• Security incidents management (detection, analysis, response and recovery).
• Cause analysis and post-incident security reviews.
• Work with law enforcement and other regulatory agencies during and after a security incident.
4- Department: Information Security Governance
His job:
Managing, measuring performance and correcting the course of all information security activities. It includes ensuring compliance with all external and internal requirements, spreading security culture and minimizing risks in line with Tabuk University's risk-bearing policy.
His tasks: