Security of IT based learning systems

نویسنده

  • Hans-Ulrich Bierhahn
چکیده

IT security incidents are increasing nearly exponentially. With this increase, the importance of data accessibility, confidentiality, integrity, and authenticity grows. IT-based learning systems are especially endangered through intentional destructive actions. A basic condition to guarantee the security of personal data is the compliance with national laws and international regulations, especially the data protection laws. Furthermore, the complex standards of the BSI baseline protection manual must be fulfilled to avoid intentional destructive actions against the IT systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

A Systemic Approach to Improving Teaching and Learning

This paper describes one university’s approach to improving the quality of teaching and learning at the institutional level, based on the premise of improving the design of curriculum rather than focusing on the skills of teachers as such. The paper describes the process by which university-wide principles of curriculum design were defined and agreed, as well as the parallel campaigns needed to...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

A Systemic Approach to Improving Teaching and Learning

This paper describes one university’s approach to improving the quality of teaching and learning at the institutional level, based on the premise of improving the design of curriculum rather than focusing on the skills of teachers as such. The paper describes the process by which university-wide principles of curriculum design were defined and agreed, as well as the parallel campaigns needed to...

متن کامل

Detection of children's activities in smart home based on deep learning approach

 Monitoring behavior of children in the home is the extremely important to avoid the possible injuries. Therefore, an automated monitoring system for monitoring behavior of children by researchers has been considered. The first step for designing and executing an automated monitoring system on children's behavior in closed spaces is possible with recognize their activity by the sensors in the e...

متن کامل

Detection of children's activities in smart home based on deep learning approach

 Monitoring behavior of children in the home is the extremely important to avoid the possible injuries. Therefore, an automated monitoring system for monitoring behavior of children by researchers has been considered. The first step for designing and executing an automated monitoring system on children's behavior in closed spaces is possible with recognize their activity by the sensors in the e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. J. Comp. Sci. Sport

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2002