Eibl, Christian Josef: Discussion of information security in e-learning. 2010
Inhalt
- Abstract
- Kurzfassung
- Vorwort
- Contents
- List of Figures
- List of Tables
- List of Abbreviations
- Introduction
- Motivation
- Outlining Fundamental Terms for this Discussion
- Objectives
- Achieving these Goals
- Principal Contributions
- Literature Survey
- Overview
- Search Space
- (Closely) Related Work
- Terminology and Structure for Extracting Activities
- Implications from Educational Science for E-Learning Systems
- Social Support by Cooperation and Communication
- Activities of Students as Important Step of the Learning Process
- Priority to Meet Learning Objectives
- Flexible Learning
- Integration into Learning Environment
- Security Engineering for E-Learning
- Resulting Limitations for Practical Systems
- Conclusion
- Preparation of the Threat Analysis
- Analysis of Threats in E-Learning Systems
- Overview
- Threat Analysis Approach
- Analysis of E-Learning Assets
- Introduction to Fault Tree Terminology
- Scenario: Purchased Advanced Training with Mentoring
- Threats of E-Learning Assets
- Analysis of Information Security Service Assets
- Scenario: Distant University with Various Study Courses
- Threats of Information Security Service Assets
- Analysis of Web Service Assets
- Perpetual Concept Related Issues
- Low Level Event Based Threats
- Conclusion
- Case Studies
- Recommendations
- Overview
- Management Strategies
- Implementation Concepts and Technical Remarks
- Organisational Concept and Policies
- User Support and Human Factor
- Security Agent for Practical Support
- General Specifications
- Integrity Protection by Digital Signatures
- Realisation
- Application in MOODLE
- Conclusion of the Security Agent Project
- Conclusion
- Conclusion and Future Work
- Complete Fault Tree Analysis Results
