ATTACK SCENARIOS ON SYSTEM OF REMOTE EDUCATION

Authors

DOI:

https://doi.org/10.18372/2225-5036.30.19246

Keywords:

system of remote education, watermark, steganorgaphy, data format, feedback, sharing the secret, match search, optical character recognition (OCR)

Abstract

The development of both the violator model and threat model is required for protection of information system from potential harmful influence. Harmful influence can be caused by accident (by its legit users) or intentionally (by violators). Each model is an abstraction and the level of detail of this abstraction is determined by a few factors. One such factor is the object of protection. Systems of remote education are used by people in a wide range of ages – from 1st grade school students to adult university/college students, while the range of objects of attacks include educational materials and user accounts that contain personal data. The specifics of functioning of systems of remote education accounts for processing data in different formats and interactive, synchronous and asynchronous interaction of users who can have different roles in the system. One should also expect the abuse of main functions executed by legit users of the system and to watch over restriction of access to the system from external network.

References

Diehl E. – Securing Digital Video:Techniques for DRM and Content Protection. 2012. DOI: 10.1007/978-3-642-17345-5_1, Springer-Verlag Heidelberg, ISBN-10 ‏ : ‎ 3642434886, ISBN-13 ‏ : ‎ 978-3642434884

M. Asikuzzaman and M. R. Pickering, "An Overview of Digital Video Watermarking," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 9, pp. 2131-2153, Sept. 2018, doi: 10.1109/TCSVT.2017.2712162. keywords: {Watermarking;Streaming media;Motion pictures;Three-dimensional displays;Copyright protection;Internet;Robustness;Watermarking;robustness;geometric attack;depth-image-based rendering (DIBR);multi-view video}

Liu, Yunxia & Liu, Shuyang & Wang, Yonghao & Zhao, Hongguo & Liu, Si. (2018). Video Steganography: A Review. Neurocomputing. 335. 10.1016/j.neucom.2018.09.091.

Beimel, Amos. (2011). Secret-Sharing Schemes: A Survey. Coding and Cryptology. 11-46. 10.1007/978-3-642-20901-7_2.

Paul Heckel. 1978. A technique for isolating differences between files. Commun. ACM 21, 4 (April 1978), 264–268. https://doi.org/10.1145/359460.359467

A. Zramdini and R. Ingold, "Optical font recognition using typographical features," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 877-882, Aug. 1998, doi: 10.1109/34.709616. keywords: {Optical character recognition software;Character recognition;Optical sensors;Bayesian methods;Text recognition;Image recognition;Text analysis;Feature extraction;Robustness;Optical design},

Perwej, Dr. Yusuf & Hannan, Shaikh Abdul & Asif, Ali & Mane, Arjun. (2014). An Overview and Applications of Optical Character Recognition. International Journal of Advance Research In Science And Engineering (IJARSE). Vol. 3. Pages 261- 274.

John Barkley. 1997. Comparing simple role based access control models and access control lists. In Proceedings of the second ACM workshop on Role-based access control (RBAC '97). Association for Computing Machinery, New York, NY, USA, 127–132. https://doi.org/10.1145/266741.266769

Published

2024-12-03