A simple icon, consisting of a series of links surrounded by a circle, is a common symbol for a connection or hyperlink. The lines of the icon are outlined in a dark black color on the background, with the addition of military elements of the Saudi national identity such as the Ghutra, Shamaa, and Saudi Bisht, to reflect the distinctive local character of Qassim University.
Links to official Saudi educational websites end with edu.sa
All links to official educational websites of government agencies in Saudi Arabia end with .edu.sa.
Black leather minimalist gesture tag, black circular grip, topped with a clear depiction of a Saudi tunic with a shamma and aqal, emphasizing the features of the Saudi bisht. This design symbolizes the concept of security and digital data privacy and reflects the identity of Qassim University.
protocol for encryption and security. HTTPS for encryption and security.
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Digital Government Authority

Cybersecurity Management

This document addresses cybersecurity controls for organizational social media accounts. It was prepared by the National Cybersecurity Authority with the aim of establishing a regulatory framework that defines the minimum requirements necessary to protect official accounts from cybersecurity risks and threats. The importance of this document is highlighted by the significant expansion in the use of social media platforms as official channels for communicating with stakeholders, which has increased the likelihood of exposure to hacking attempts, impersonation, or misuse. This necessitates the adoption of clear controls that ensure the safe and reliable use of these platforms.

The document begins with an executive summary and an introduction, which discuss the role of social media networks in improving user experience and accelerating response, alongside the associated security challenges. It also reviews the objectives of the controls, which include raising the level of cybersecurity, enabling entities to use these networks safely, and enhancing the ability to respond to cyber incidents. It also defines the scope of application, which includes government entities and some private entities with sensitive infrastructure.

The document includes an integrated control structure, distributed across three main components: cybersecurity governance, cybersecurity enhancement, and external cybersecurity. These components encompass a number of sub-controls covering multiple areas such as risk management, identity and access management, system protection, mobile device security, data protection, as well as incident and cyber threat management.

The document also emphasizes the importance of continuous commitment and implementation of these controls, through self-assessment or audit visits, stressing the need for regular updates to keep pace with technological advancements and emerging threats. In its entirety, it affirms that achieving social media account security requires the integration of policies, procedures, and technologies, alongside raising employee awareness, to ensure the protection of information assets and enhance trust in official digital channels.

Cookies

This website uses special cookies to ensure ease of use, improve your browsing experience, and clarify the terms and policies related to About user privacy. By continuing to browse this website, you acknowledge that you accept the use of cookies and the terms of the Privacy Policy