A Review of Security Threats by The Unauthorized in The E-Learning
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.14, No. 11)Publication Date: 2015-08-14
Authors : Mohamed Saleh;
Page : 6240-6243
Keywords : Keyword: unauthorized; threats; E-learning security.;
Abstract
Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials. In today's focused world, each Organization is endeavoring to enhance its proficiency and guarantee the nature of data asset. Computer networking technologies - intranet, web - have progressed to the point where data can be put away, transmitted, and available to people accessing the resource anytime and from anywhere.? These advantages additionally push organizations into executing web based innovation without considering the security dangers that this involves.
Other Latest Articles
- Security of Web Services: Methods and Contrivance
- Design and implementation of a health document
- Systolic Architecture for High Speed FIR Filter Using VLSI Technology
- An Efficient Multi Parent Hierarchical Routing Protocol for WSN’s
- Suggested Marketing Strategy Using Apriori and FP-Growth Algorithms in retail sales in Egypt
Last modified: 2016-06-29 16:02:37