A Review of Security Threats by The Unauthorized in The E-Learning

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 11

Abstract

Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials. In today's focused world, each Organization is endeavoring to enhance its proficiency and guarantee the nature of data asset. Computer networking technologies - intranet, web - have progressed to the point where data can be put away, transmitted, and available to people accessing the resource anytime and from anywhere.  These advantages additionally push organizations into executing web based innovation without considering the security dangers that this involves.

Authors and Affiliations

Mohamed Munser Saleh

Keywords

Related Articles

Image Enhancement based on Contrast Enhancement & Fuzzification Histogram Equalization and Comparison with Contrast Enhancement Techniques

Contrast Enhancement is a technique which comes into the part of Image Enhancement. Contrast Enhancement is used to enhance the visual quality of any captured or other image. Contrast Enhancement can be performed with th...

Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation

Data mining is a very active research area that deals with the extraction of  knowledge from very large databases. Data mining has made knowledge extraction and decision making easy. The extracted knowledge could reveal...

AFDroid: Anti-Forensics Device To Protect Android System

Mobile devices are among the most common new technologies of the year, gaining even more spread over and success in the day-to-day life of wide range of people. Unfortunately, while the number of mobile devices are used...

Performance Analysis of Amplify and Forward Cooperative Networks over Rayleigh and Nakagami-m Channels based Relaying Selection

In this paper investigates the performance, analysis of amplify and forward (AF) cooperative networks with the relay selection over  Nakagami-m and Rayleigh fading channels and  M-ary phase shift keying (MPSK) modulati...

Techniques in Image Steganography using Famous Number Sequences

In In the last decades, Steganography techniques have been applied in a variety of data files. The need of copyrightprotection in Music, in Photography e.t.c pushed the software companies to develop many steganographic s...

Download PDF file
  • EP ID EP650742
  • DOI 10.24297/ijct.v14i11.1808
  • Views 88
  • Downloads 0

How To Cite

Mohamed Munser Saleh (2015). A Review of Security Threats by The Unauthorized in The E-Learning. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 14(11), 6240-6243. https://europub.co.uk/articles/-A-650742