Assessing Ethical Severity of e-Learning Systems Security Attacks.
Yair LevyMichelle M. RamimRaymond A. HackneyPublished in: J. Comput. Inf. Syst. (2013)
Keyphrases
- security threats
- security problems
- security mechanisms
- security protocols
- computer security
- denial of service attacks
- cyber attacks
- security vulnerabilities
- security measures
- java card
- security breaches
- security risks
- e learning
- information security
- chosen plaintext
- stream cipher
- countermeasures
- security flaws
- security issues
- cryptographic protocols
- malicious users
- security requirements
- fault injection
- buffer overflow
- cryptographic algorithms
- malicious attacks
- information leakage
- privacy issues
- dos attacks
- secure routing
- intrusion detection
- insider attacks
- biometric template
- identity theft
- access control
- learning systems
- intrusion prevention
- intrusion detection and prevention
- learning objects
- intrusion detection system
- network security
- watermarking scheme
- security analysis
- key management
- resource constrained
- malicious nodes
- smart card
- security management
- personal information
- sensitive data