سطر 1: |
سطر 1: |
| أمن المعلومات : | | أمن المعلومات : |
| + | تعريف بأمن المعلومات ؟ |
| + | |
| + | فهم التهديدات |
| + | البرمجيات الخبيثة "فيروسات - تروجان - سبام - ..." |
| + | |
| + | Security policies - سياسة الحماية |
| + | Confidentiality policies |
| + | |
| + | Legal and Ethical Issues |
| + | Cybercrime and computer crime |
| + | Intellectual property, copyright, patent, trade secret |
| + | Hacking and intrusion |
| + | Privacy, identity theft. |
| + | |
| + | : Cryptography |
| + | Block and stream ciphers |
| + | Cryptographic hash functions, Message Authentication Codes (MAC) |
| + | Public and private key systems |
| + | Authentication |
| + | Password system |