Security in E-Learning (eBook)
XVIII, 185 Seiten
Springer US (Verlag)
978-0-387-26065-5 (ISBN)
As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this book.Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.
Contents 6
List of Figures 12
Preface 15
Part I Quick Start 19
1 Introduction 21
1.1 Basic Security Terminology 22
1.2 E-Learning 25
1.3 Getting Started: a Brief Review of the Literature 27
2 Authors 31
2.1 The Most Important Questions for Authors 31
2.2 Why is Security Relevant to Authors? 32
2.3 Security Requirements for Authors 33
2.4 Assets in the Author's View 35
2.5 Security Risk Analysis for Authors 36
3 Teachers 39
3.1 The Most Important Questions for Teachers 39
3.2 Security Requirements in Teaching 40
3.3 How to Improve Security in Teaching 44
4 Managers 53
4.1 The Most Important Questions for Managers 53
4.2 Organizational Security 54
4.3 Motivation 59
4.4 Structural Security Measures 61
4.5 Learning Management and Learning Content Management Systems 63
4.6 Business Continuity Management 65
5 Students 67
5.1 Why is Security Relevant? 67
5.2 How Students Can Contribute 69
Part II In-Depth 73
6 Protecting Content 75
6.1 How do I Protect Documents? 75
6.2 How do I Protect Texts? 76
6.3 How do I Protect Images? 78
6.4 Protection of Audio Content 82
6-5 Copy Protection for Programs 83
6.6 Protecting Content against Unauthorized Modification 88
7 Security Risk Analysis 91
7.1 Frequently Asked Questions 92
7.2 Standard Method 96
7.3 Quantitative and Qualitative Risk Analysis 100
7.4 Risk Analysis in 90 Minutes 101
7.5 Example of a 90-Minute Analysis 106
7.6 Exercise: Security Risk Analysis 114
8 Personal Security Checklist 115
8.1 Viruses, Trojan Horses, Worms, and other Animals 115
8.2 Email 118
8.3 Web-based Email Services 119
8.4 Network Connections 119
8.5 Wireless Networks 120
8.6 Encryption of Sensitive Information 121
8.7 Backups 121
8.8 Deleting files 123
9 Access Control, Authentication & Auditing
9.1 Access Control 129
9.2 Authentication 136
9.3 Auditing 141
10 Cryptography 149
10.1 Secret Key Algorithms 150
10.2 Public Key Algorithms 151
10.3 Digital Signatures 160
10.4 Cryptographic File Systems 162
10.5 Cryptographic Envelopes 163
10.6 Cryptanalysis 165
10.7 SSL 167
Part III Additional Resources 173
11 PGP - Pretty Good Privacy 175
11.1 Encryption with PGP 175
11.2 Generating new keys with PGP 176
11.3 Secure deletion with PGP 181
12 Plagiarism Detection and Prevention 185
12.1 Turnitin.com 185
12.2 MyDropbox.com 187
13 Glossary 191
Bibliography 195
Index 201
Erscheint lt. Verlag | 4.11.2005 |
---|---|
Reihe/Serie | Advances in Information Security | Advances in Information Security |
Zusatzinfo | XVIII, 185 p. 43 illus. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Programmiersprachen / -werkzeuge | |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Naturwissenschaften | |
Schlagworte | ACCESS • Access Control • authentication • Computer Science • cryptography • Design • object oriented design • privacy • security |
ISBN-10 | 0-387-26065-X / 038726065X |
ISBN-13 | 978-0-387-26065-5 / 9780387260655 |
Haben Sie eine Frage zum Produkt? |
Größe: 31,4 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich