Security in E-learning

by
Format: Hardcover
Pub. Date: 2005-07-01
Publisher(s): Springer Verlag
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $169.99

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$35.64
Online:60 Days access
Downloadable:60 Days
$47.52
Online:90 Days access
Downloadable:90 Days
$59.40
Online:120 Days access
Downloadable:120 Days
$71.28
Online:180 Days access
Downloadable:180 Days
$77.22
Online:1825 Days access
Downloadable:Lifetime Access
$118.80
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$77.22*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

"Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics." "Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science."--BOOK JACKET.

Table of Contents

Preface xv
1 Quick Start 1(54)
1 Introduction
3(10)
1.1 Basic Security Terminology
4(3)
1.1.1 Categories of Security
4(1)
1.1.2 Basic Security Requirements
5(2)
1.2 E-Learning
7(2)
1.2.1 Web-Based Training
8(1)
1.2.2 Computer-Based Training
8(1)
1.2.3 Instructor-Led vs. Self-Paced Training
9(1)
1.3 Getting Started: a Brief Review of the Literature
9(4)
1.3.1 Scope
9(1)
1.3.2 Interdependence
10(1)
1.3.3 Global Reach
10(3)
2 Authors
13(8)
2.1 The Most Important Questions for Authors
13(1)
2.2 Why is Security Relevant to Authors?
14(1)
2.3 Security Requirements for Authors
15(2)
2.3.1 Readers must be able to rely on the correctness of the content
15(1)
2.3.2 Readers want to read unobserved
15(1)
2.3.3 Protection against unauthorized use
16(1)
2.3.4 Protection against unauthorized modification
16(1)
2.3.5 Protection against destruction and loss of data
17(1)
2.4 Assets in the Author's View
17(1)
2.4.1 Texts
17(1)
2.4.2 Images
18(1)
2.4.3 Audio
18(1)
2.4.4 Interactive Examples and Simulations
18(1)
2.5 Security Risk Analysis for Authors
18(3)
3 Teachers
21(14)
3.1 The Most Important Questions for Teachers
21(1)
3.2 Security Requirements in Teaching
22(4)
3.2.1 Courses
22(2)
3.2.2 Administration
24(1)
3.2.3 Exams
25(1)
3.3 How to Improve Security in Teaching
26(9)
3.3.1 Securing Courses
26(3)
3.3.2 Securing Administrative Work
29(1)
3.3.3 Minimizing Examination Risks
30(5)
4 Managers
35(14)
4.1 The Most Important Questions for Managers
35(1)
4.2 Organizational Security
36(5)
4.2.1 Security Has Top Priority
37(2)
4.2.2 Security Policies
39(2)
4.2.3 Legal Foundations
41(1)
4.3 Motivation
41(2)
4.3.1 Understanding the Aim
41(1)
4.3.2 Requirements for Staff Members
42(1)
4.3.3 Security Checklist for Organizations
42(1)
4.4 Structural Security Measures
43(2)
4.4.1 Server and Central Infrastructure
43(1)
4.4.2 Desktop Computers
44(1)
4.5 Learning Management and Learning Content Management Systems
45(2)
4.6 Business Continuity Management
47(2)
5 Students
49(6)
5.1 Why is Security Relevant?
49(2)
5.2 How Students Can Contribute
51(6)
5.2.1 Basics
51(1)
5.2.2 Security Risk Analysis
51(4)
II In-Depth 55(100)
6 Protecting Content
57(16)
6.1 How do I Protect Documents?
57(1)
6.2 How do I Protect Texts?
58(2)
6.2.1 Protection against Unauthorized Use by a Third Party
58(1)
6.2.2 Protection against Unauthorized Use by Legitimate Users
58(2)
6.3 How do I Protect Images?
60(4)
6.3.1 Embedding of Digital Watermarks
60(2)
6.3.2 Detecting Digital Watermarks
62(1)
6.3.3 Robustness
62(1)
6.3.4 Watermarking Products
63(1)
6.4 Protection of Audio Content
64(1)
6.5 Copy Protection for Programs
65(5)
6.5.1 Preventing Physical Copies
65(1)
6.5.2 Preventing the Use of Copies
65(1)
6.5.3 Hardware Keys Dongles
66(1)
6.5.4 Online Software Keys
66(1)
6.5.5 Offline Software Keys
67(1)
6.5.6 Interactive Examples and Self Tests
68(2)
6.5.7 Interaction with People
70(1)
6.6 Protecting Content against Unauthorized Modification
70(3)
7 Security Risk Analysis
73(24)
7.1 Frequently Asked Questions
74(4)
7.1.1 Why should a risk analysis be conducted?
74(1)
7.1.2 When should a risk analysis be conducted?
75(1)
7.1.3 Who should participate in a risk analysis?
75(1)
7.1.4 How long should a risk analysis take?
75(1)
7.1.5 What does a risk analysis analyze?
76(1)
7.1.6 What should the result of a risk analysis comprise?
77(1)
7.1.7 How is the success of a risk analysis measured?
77(1)
7.2 Standard Method
78(4)
7.2.1 Identification of Assets
79(1)
7.2.2 List of Risks
80(1)
7.2.3 Setting Priorities
80(1)
7.2.4 Implementation of Controls and Counter Measures
81(1)
7.2.5 Monitoring of Risks and Effectiveness of Counter Measures
82(1)
7.3 Quantitative and Qualitative Risk Analysis
82(1)
7.4 Risk Analysis in 90 Minutes
83(5)
7.4.1 Creating a Matrix for Risk Analysis
84(1)
7.4.2 Brainstorming
84(1)
7.4.3 Consolidation of Results
85(1)
7.4.4 Specification of Risks
85(1)
7.4.5 Estimation of Probability and Costs
85(1)
7.4.6 Arranging the List
86(1)
7.4.7 Creating a Document
87(1)
7.4.8 Revision
88(1)
7.5 Example of a 90-Minute Analysis
88(8)
7.5.1 Scope of the E-Learning Project
89(1)
7.5.2 Creating a Matrix for Risk Analysis
90(1)
7.5.3 Brainstorming
90(1)
7.5.4 Consolidation of Results
90(1)
7.5.5 Specification of Risks
90(1)
7.5.6 Estimation of Probabilities and Costs
90(1)
7.5.7 Arranging the List
90(5)
7.5.8 Creating a Document
95(1)
7.5.9 Revision
96(1)
7.6 Exercise: Security Risk Analysis
96(1)
8 Personal Security Checklist
97(14)
8.1 Viruses, Trojan Horses, Worms, and other Animals
97(3)
8.1.1 Viruses
98(1)
8.1.2 Macro Viruses
99(1)
8.1.3 Trojan Horses
99(1)
8.1.4 Worms
99(1)
8.1.5 Virus Protection Software
100(1)
8.2 Email
100(1)
8.3 Web-based Email Services
101(1)
8.4 Network Connections
101(1)
8.5 Wireless Networks
102(1)
8.6 Encryption of Sensitive Information
103(1)
8.7 Backups
103(2)
8.7.1 Backup Strategies
103(1)
8.7.2 Restoration of the Current State
104(1)
8.7.3 Restoration of a Previous State
105(1)
8.7.4 Storage of Backups
105(1)
8.7.5 Tools
105(1)
8.8 Deleting files
105(6)
8.8.1 Six Stages of Deletion
106(1)
8.8.2 Swap Files and Caches
107(4)
9 Access Control, Authentication & Auditing
111(20)
9.1 Access Control
111(7)
9.1.1 Discretionary Access Control
112(1)
9.1.2 Role-based access control
113(2)
9.1.3 Mandatory access control
115(1)
9.1.4 Basic HTTP access control
116(2)
9.2 Authentication
118(5)
9.2.1 What you know - Passwords
118(3)
9.2.2 What you do - Signatures
121(1)
9.2.3 What you are - Biometrics
121(2)
9.2.4 What you have - Tokens
123(1)
9.3 Auditing
123(8)
9.3.1 Auditing with Windows 2000/XP
124(1)
9.3.2 Auditing with Moodle
124(6)
9.3.3 Privacy Aspects when Using E-learning Software
130(1)
10 Cryptography
131(24)
10.1 Secret Key Algorithms
132(1)
10.2 Public Key Algorithms
133(9)
10.2.1 Certification Authority
135(5)
10.2.2 Key Management
140(2)
10.3 Digital Signatures
142(2)
10.3.1 Hash Functions
143(1)
10.4 Cryptographic File Systems
144(1)
10.5 Cryptographic Envelopes
145(2)
10.6 Cryptanalysis
147(2)
10.6.1 Brute-Force Attack
148(1)
10.6.2 Plain Text Attack
148(1)
10.6.3 Chosen Plain Text Attack
148(1)
10.7 SSL
149(6)
III Additional Resources 155(22)
11 PGP - Pretty Good Privacy
157(10)
11.1 Encryption with PGP
157(1)
11.2 Generating new keys with PGP
158(5)
11.3 Secure deletion with PGP
163(4)
12 Plagiarism Detection and Prevention
167(6)
12.1 Turnitin.com
167(2)
12.2 MyDropbox.com
169(4)
13 Glossary
173(4)
Bibliography 177(6)
Index 183

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.