Cyber Security Department

مشاركة الصفحة

Department Overview

​The approval of His Excellency the President of the University was issued to establish the Cybersecurity Department No. 350/41 dated 05/14/1441 AH, corresponding to 01/09/2020 AD, to be an independent department affiliated with him, to adhere to cybersecurity controls in order to enhance the level of cybersecurity at the university and reduce cyber risks. And protecting information and technical assets.

Deanship Image

Vision, Mission and Goals

Vision
Vision

Accessing Hail University to a secure, reliable, and supportive cyberspace that fosters growth and prosperity.​

Message
Message

The administration seeks to provide a safe and secure work environment that adheres to cybersecurity controls and standards, and to establish the principle of shared responsibility in protecting the university's cyberspace, protecting information and technological assets from cyber risks, maintaining the confidentiality and integrity of data from manipulation, and ensuring its availability to beneficiaries.​

Goals
Goals

The administration aims to achieve the following objectives:

1. To raise the level of cybersecurity awareness among university staff.

2. To govern cybersecurity activities and practices within the university.

3. To protect the university's technological and informational assets from cyber threats.

4. To provide high-quality cybersecurity solutions.​

Organizational Structure

​​​هيكل ادارة الامن السيبراني.PNG

Controls and Policies

To view all polices, please go to Single Sign On (SSO)

Then browse Daeem Plus

Management tasks

​​​
1. Comply with all applicable national and international laws, regulations, frameworks, and standards related to cybersecurity.

2. Familiarize university staff with the correct cybersecurity policies and procedures and their implementation.

3. Provide the university with high-quality services to enhance its cybersecurity and achieve its mission of digital transformation.

4. Review the source code of the university's electronic systems to ensure their security against vulnerabilities.

5. Contract with specialized information security firms to protect the university's systems.

6. Identify, measure, and analyze potential breach points.

7. Conduct forensic analysis of traffic on the university's networks.

8. Investigate unauthorized access to the university's systems.

9. Continuously monitor the university's operational systems to ensure their readiness and preparedness for cybersecurity threats.

10. Prepare periodic statistics and reports on the university's systems.

11. Any other tasks assigned by management.

Contact us

Phone No.


To contact the supervisor of the Cybersecurity Department:
  Ext. 2600​


Email

 
cyber.security@uoh.edu.sa

Address

Hail
Kingdom of Saudi Arabia

Important Links