|
Contents |
6 |
|
|
List of Figures |
12 |
|
|
Preface |
15 |
|
|
Part I Quick Start |
19 |
|
|
1 Introduction |
21 |
|
|
1.1 Basic Security Terminology |
22 |
|
|
1.2 E-Learning |
25 |
|
|
1.3 Getting Started: a Brief Review of the Literature |
27 |
|
|
2 Authors |
31 |
|
|
2.1 The Most Important Questions for Authors |
31 |
|
|
2.2 Why is Security Relevant to Authors? |
32 |
|
|
2.3 Security Requirements for Authors |
33 |
|
|
2.4 Assets in the Author's View |
35 |
|
|
2.5 Security Risk Analysis for Authors |
36 |
|
|
3 Teachers |
39 |
|
|
3.1 The Most Important Questions for Teachers |
39 |
|
|
3.2 Security Requirements in Teaching |
40 |
|
|
3.3 How to Improve Security in Teaching |
44 |
|
|
4 Managers |
53 |
|
|
4.1 The Most Important Questions for Managers |
53 |
|
|
4.2 Organizational Security |
54 |
|
|
4.3 Motivation |
59 |
|
|
4.4 Structural Security Measures |
61 |
|
|
4.5 Learning Management and Learning Content Management Systems |
63 |
|
|
4.6 Business Continuity Management |
65 |
|
|
5 Students |
67 |
|
|
5.1 Why is Security Relevant? |
67 |
|
|
5.2 How Students Can Contribute |
69 |
|
|
Part II In-Depth |
73 |
|
|
6 Protecting Content |
75 |
|
|
6.1 How do I Protect Documents? |
75 |
|
|
6.2 How do I Protect Texts? |
76 |
|
|
6.3 How do I Protect Images? |
78 |
|
|
6.4 Protection of Audio Content |
82 |
|
|
6-5 Copy Protection for Programs |
83 |
|
|
6.6 Protecting Content against Unauthorized Modification |
88 |
|
|
7 Security Risk Analysis |
91 |
|
|
7.1 Frequently Asked Questions |
92 |
|
|
7.2 Standard Method |
96 |
|
|
7.3 Quantitative and Qualitative Risk Analysis |
100 |
|
|
7.4 Risk Analysis in 90 Minutes |
101 |
|
|
7.5 Example of a 90-Minute Analysis |
106 |
|
|
7.6 Exercise: Security Risk Analysis |
114 |
|
|
8 Personal Security Checklist |
115 |
|
|
8.1 Viruses, Trojan Horses, Worms, and other Animals |
115 |
|
|
8.2 Email |
118 |
|
|
8.3 Web-based Email Services |
119 |
|
|
8.4 Network Connections |
119 |
|
|
8.5 Wireless Networks |
120 |
|
|
8.6 Encryption of Sensitive Information |
121 |
|
|
8.7 Backups |
121 |
|
|
8.8 Deleting files |
123 |
|
|
9 Access Control, Authentication & Auditing |
129 |
|
|
9.1 Access Control |
129 |
|
|
9.2 Authentication |
136 |
|
|
9.3 Auditing |
141 |
|
|
10 Cryptography |
149 |
|
|
10.1 Secret Key Algorithms |
150 |
|
|
10.2 Public Key Algorithms |
151 |
|
|
10.3 Digital Signatures |
160 |
|
|
10.4 Cryptographic File Systems |
162 |
|
|
10.5 Cryptographic Envelopes |
163 |
|
|
10.6 Cryptanalysis |
165 |
|
|
10.7 SSL |
167 |
|
|
Part III Additional Resources |
173 |
|
|
11 PGP - Pretty Good Privacy |
175 |
|
|
11.1 Encryption with PGP |
175 |
|
|
11.2 Generating new keys with PGP |
176 |
|
|
11.3 Secure deletion with PGP |
181 |
|
|
12 Plagiarism Detection and Prevention |
185 |
|
|
12.1 Turnitin.com |
185 |
|
|
12.2 MyDropbox.com |
187 |
|
|
13 Glossary |
191 |
|
|
Bibliography |
195 |
|
|
Index |
201 |
|