E-Book, Englisch, Band 16, 194 Seiten
Weippl Security in E-Learning
1. Auflage 2005
ISBN: 978-0-387-26065-5
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, Band 16, 194 Seiten
Reihe: Advances in Information Security
ISBN: 978-0-387-26065-5
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents;6
2;List of Figures;12
3;Preface;15
4;Part I Quick Start;19
4.1;1 Introduction;21
4.1.1;1.1 Basic Security Terminology;22
4.1.2;1.2 E-Learning;25
4.1.3;1.3 Getting Started: a Brief Review of the Literature;27
4.2;2 Authors;31
4.2.1;2.1 The Most Important Questions for Authors;31
4.2.2;2.2 Why is Security Relevant to Authors?;32
4.2.3;2.3 Security Requirements for Authors;33
4.2.4;2.4 Assets in the Author's View;35
4.2.5;2.5 Security Risk Analysis for Authors;36
4.3;3 Teachers;39
4.3.1;3.1 The Most Important Questions for Teachers;39
4.3.2;3.2 Security Requirements in Teaching;40
4.3.3;3.3 How to Improve Security in Teaching;44
4.4;4 Managers;53
4.4.1;4.1 The Most Important Questions for Managers;53
4.4.2;4.2 Organizational Security;54
4.4.3;4.3 Motivation;59
4.4.4;4.4 Structural Security Measures;61
4.4.5;4.5 Learning Management and Learning Content Management Systems;63
4.4.6;4.6 Business Continuity Management;65
4.5;5 Students;67
4.5.1;5.1 Why is Security Relevant?;67
4.5.2;5.2 How Students Can Contribute;69
5;Part II In-Depth;73
5.1;6 Protecting Content;75
5.1.1;6.1 How do I Protect Documents?;75
5.1.2;6.2 How do I Protect Texts?;76
5.1.3;6.3 How do I Protect Images?;78
5.1.4;6.4 Protection of Audio Content;82
5.1.5;6-5 Copy Protection for Programs;83
5.1.6;6.6 Protecting Content against Unauthorized Modification;88
5.2;7 Security Risk Analysis;91
5.2.1;7.1 Frequently Asked Questions;92
5.2.2;7.2 Standard Method;96
5.2.3;7.3 Quantitative and Qualitative Risk Analysis;100
5.2.4;7.4 Risk Analysis in 90 Minutes;101
5.2.5;7.5 Example of a 90-Minute Analysis;106
5.2.6;7.6 Exercise: Security Risk Analysis;114
5.3;8 Personal Security Checklist;115
5.3.1;8.1 Viruses, Trojan Horses, Worms, and other Animals;115
5.3.2;8.2 Email;118
5.3.3;8.3 Web-based Email Services;119
5.3.4;8.4 Network Connections;119
5.3.5;8.5 Wireless Networks;120
5.3.6;8.6 Encryption of Sensitive Information;121
5.3.7;8.7 Backups;121
5.3.8;8.8 Deleting files;123
5.4;9 Access Control, Authentication & Auditing;129
5.4.1;9.1 Access Control;129
5.4.2;9.2 Authentication;136
5.4.3;9.3 Auditing;141
5.5;10 Cryptography;149
5.5.1;10.1 Secret Key Algorithms;150
5.5.2;10.2 Public Key Algorithms;151
5.5.3;10.3 Digital Signatures;160
5.5.4;10.4 Cryptographic File Systems;162
5.5.5;10.5 Cryptographic Envelopes;163
5.5.6;10.6 Cryptanalysis;165
5.5.7;10.7 SSL;167
6;Part III Additional Resources;173
6.1;11 PGP - Pretty Good Privacy;175
6.1.1;11.1 Encryption with PGP;175
6.1.2;11.2 Generating new keys with PGP;176
6.1.3;11.3 Secure deletion with PGP;181
6.2;12 Plagiarism Detection and Prevention ;185
6.2.1;12.1 Turnitin.com;185
6.2.2;12.2 MyDropbox.com;187
6.3;13 Glossary;191
7;Bibliography;195
8;Index;201




