Preface |
|
xv | |
1 Quick Start |
|
1 | (54) |
|
|
3 | (10) |
|
1.1 Basic Security Terminology |
|
|
4 | (3) |
|
1.1.1 Categories of Security |
|
|
4 | (1) |
|
1.1.2 Basic Security Requirements |
|
|
5 | (2) |
|
|
7 | (2) |
|
|
8 | (1) |
|
1.2.2 Computer-Based Training |
|
|
8 | (1) |
|
1.2.3 Instructor-Led vs. Self-Paced Training |
|
|
9 | (1) |
|
1.3 Getting Started: a Brief Review of the Literature |
|
|
9 | (4) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (3) |
|
|
13 | (8) |
|
2.1 The Most Important Questions for Authors |
|
|
13 | (1) |
|
2.2 Why is Security Relevant to Authors? |
|
|
14 | (1) |
|
2.3 Security Requirements for Authors |
|
|
15 | (2) |
|
2.3.1 Readers must be able to rely on the correctness of the content |
|
|
15 | (1) |
|
2.3.2 Readers want to read unobserved |
|
|
15 | (1) |
|
2.3.3 Protection against unauthorized use |
|
|
16 | (1) |
|
2.3.4 Protection against unauthorized modification |
|
|
16 | (1) |
|
2.3.5 Protection against destruction and loss of data |
|
|
17 | (1) |
|
2.4 Assets in the Author's View |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
2.4.4 Interactive Examples and Simulations |
|
|
18 | (1) |
|
2.5 Security Risk Analysis for Authors |
|
|
18 | (3) |
|
|
21 | (14) |
|
3.1 The Most Important Questions for Teachers |
|
|
21 | (1) |
|
3.2 Security Requirements in Teaching |
|
|
22 | (4) |
|
|
22 | (2) |
|
|
24 | (1) |
|
|
25 | (1) |
|
3.3 How to Improve Security in Teaching |
|
|
26 | (9) |
|
|
26 | (3) |
|
3.3.2 Securing Administrative Work |
|
|
29 | (1) |
|
3.3.3 Minimizing Examination Risks |
|
|
30 | (5) |
|
|
35 | (14) |
|
4.1 The Most Important Questions for Managers |
|
|
35 | (1) |
|
4.2 Organizational Security |
|
|
36 | (5) |
|
4.2.1 Security Has Top Priority |
|
|
37 | (2) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
41 | (2) |
|
4.3.1 Understanding the Aim |
|
|
41 | (1) |
|
4.3.2 Requirements for Staff Members |
|
|
42 | (1) |
|
4.3.3 Security Checklist for Organizations |
|
|
42 | (1) |
|
4.4 Structural Security Measures |
|
|
43 | (2) |
|
4.4.1 Server and Central Infrastructure |
|
|
43 | (1) |
|
|
44 | (1) |
|
4.5 Learning Management and Learning Content Management Systems |
|
|
45 | (2) |
|
4.6 Business Continuity Management |
|
|
47 | (2) |
|
|
49 | (6) |
|
5.1 Why is Security Relevant? |
|
|
49 | (2) |
|
5.2 How Students Can Contribute |
|
|
51 | (6) |
|
|
51 | (1) |
|
5.2.2 Security Risk Analysis |
|
|
51 | (4) |
II In-Depth |
|
55 | (100) |
|
|
57 | (16) |
|
6.1 How do I Protect Documents? |
|
|
57 | (1) |
|
6.2 How do I Protect Texts? |
|
|
58 | (2) |
|
6.2.1 Protection against Unauthorized Use by a Third Party |
|
|
58 | (1) |
|
6.2.2 Protection against Unauthorized Use by Legitimate Users |
|
|
58 | (2) |
|
6.3 How do I Protect Images? |
|
|
60 | (4) |
|
6.3.1 Embedding of Digital Watermarks |
|
|
60 | (2) |
|
6.3.2 Detecting Digital Watermarks |
|
|
62 | (1) |
|
|
62 | (1) |
|
6.3.4 Watermarking Products |
|
|
63 | (1) |
|
6.4 Protection of Audio Content |
|
|
64 | (1) |
|
6.5 Copy Protection for Programs |
|
|
65 | (5) |
|
6.5.1 Preventing Physical Copies |
|
|
65 | (1) |
|
6.5.2 Preventing the Use of Copies |
|
|
65 | (1) |
|
6.5.3 Hardware Keys Dongles |
|
|
66 | (1) |
|
6.5.4 Online Software Keys |
|
|
66 | (1) |
|
6.5.5 Offline Software Keys |
|
|
67 | (1) |
|
6.5.6 Interactive Examples and Self Tests |
|
|
68 | (2) |
|
6.5.7 Interaction with People |
|
|
70 | (1) |
|
6.6 Protecting Content against Unauthorized Modification |
|
|
70 | (3) |
|
|
73 | (24) |
|
7.1 Frequently Asked Questions |
|
|
74 | (4) |
|
7.1.1 Why should a risk analysis be conducted? |
|
|
74 | (1) |
|
7.1.2 When should a risk analysis be conducted? |
|
|
75 | (1) |
|
7.1.3 Who should participate in a risk analysis? |
|
|
75 | (1) |
|
7.1.4 How long should a risk analysis take? |
|
|
75 | (1) |
|
7.1.5 What does a risk analysis analyze? |
|
|
76 | (1) |
|
7.1.6 What should the result of a risk analysis comprise? |
|
|
77 | (1) |
|
7.1.7 How is the success of a risk analysis measured? |
|
|
77 | (1) |
|
|
78 | (4) |
|
7.2.1 Identification of Assets |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
7.2.4 Implementation of Controls and Counter Measures |
|
|
81 | (1) |
|
7.2.5 Monitoring of Risks and Effectiveness of Counter Measures |
|
|
82 | (1) |
|
7.3 Quantitative and Qualitative Risk Analysis |
|
|
82 | (1) |
|
7.4 Risk Analysis in 90 Minutes |
|
|
83 | (5) |
|
7.4.1 Creating a Matrix for Risk Analysis |
|
|
84 | (1) |
|
|
84 | (1) |
|
7.4.3 Consolidation of Results |
|
|
85 | (1) |
|
7.4.4 Specification of Risks |
|
|
85 | (1) |
|
7.4.5 Estimation of Probability and Costs |
|
|
85 | (1) |
|
|
86 | (1) |
|
7.4.7 Creating a Document |
|
|
87 | (1) |
|
|
88 | (1) |
|
7.5 Example of a 90-Minute Analysis |
|
|
88 | (8) |
|
7.5.1 Scope of the E-Learning Project |
|
|
89 | (1) |
|
7.5.2 Creating a Matrix for Risk Analysis |
|
|
90 | (1) |
|
|
90 | (1) |
|
7.5.4 Consolidation of Results |
|
|
90 | (1) |
|
7.5.5 Specification of Risks |
|
|
90 | (1) |
|
7.5.6 Estimation of Probabilities and Costs |
|
|
90 | (1) |
|
|
90 | (5) |
|
7.5.8 Creating a Document |
|
|
95 | (1) |
|
|
96 | (1) |
|
7.6 Exercise: Security Risk Analysis |
|
|
96 | (1) |
|
8 Personal Security Checklist |
|
|
97 | (14) |
|
8.1 Viruses, Trojan Horses, Worms, and other Animals |
|
|
97 | (3) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
8.1.5 Virus Protection Software |
|
|
100 | (1) |
|
|
100 | (1) |
|
8.3 Web-based Email Services |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
8.6 Encryption of Sensitive Information |
|
|
103 | (1) |
|
|
103 | (2) |
|
|
103 | (1) |
|
8.7.2 Restoration of the Current State |
|
|
104 | (1) |
|
8.7.3 Restoration of a Previous State |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (6) |
|
8.8.1 Six Stages of Deletion |
|
|
106 | (1) |
|
8.8.2 Swap Files and Caches |
|
|
107 | (4) |
|
9 Access Control, Authentication & Auditing |
|
|
111 | (20) |
|
|
111 | (7) |
|
9.1.1 Discretionary Access Control |
|
|
112 | (1) |
|
9.1.2 Role-based access control |
|
|
113 | (2) |
|
9.1.3 Mandatory access control |
|
|
115 | (1) |
|
9.1.4 Basic HTTP access control |
|
|
116 | (2) |
|
|
118 | (5) |
|
9.2.1 What you know - Passwords |
|
|
118 | (3) |
|
9.2.2 What you do - Signatures |
|
|
121 | (1) |
|
9.2.3 What you are - Biometrics |
|
|
121 | (2) |
|
9.2.4 What you have - Tokens |
|
|
123 | (1) |
|
|
123 | (8) |
|
9.3.1 Auditing with Windows 2000/XP |
|
|
124 | (1) |
|
9.3.2 Auditing with Moodle |
|
|
124 | (6) |
|
9.3.3 Privacy Aspects when Using E-learning Software |
|
|
130 | (1) |
|
|
131 | (24) |
|
10.1 Secret Key Algorithms |
|
|
132 | (1) |
|
10.2 Public Key Algorithms |
|
|
133 | (9) |
|
10.2.1 Certification Authority |
|
|
135 | (5) |
|
|
140 | (2) |
|
|
142 | (2) |
|
|
143 | (1) |
|
10.4 Cryptographic File Systems |
|
|
144 | (1) |
|
10.5 Cryptographic Envelopes |
|
|
145 | (2) |
|
|
147 | (2) |
|
10.6.1 Brute-Force Attack |
|
|
148 | (1) |
|
|
148 | (1) |
|
10.6.3 Chosen Plain Text Attack |
|
|
148 | (1) |
|
|
149 | (6) |
III Additional Resources |
|
155 | (22) |
|
11 PGP - Pretty Good Privacy |
|
|
157 | (10) |
|
|
157 | (1) |
|
11.2 Generating new keys with PGP |
|
|
158 | (5) |
|
11.3 Secure deletion with PGP |
|
|
163 | (4) |
|
12 Plagiarism Detection and Prevention |
|
|
167 | (6) |
|
|
167 | (2) |
|
|
169 | (4) |
|
|
173 | (4) |
Bibliography |
|
177 | (6) |
Index |
|
183 | |