ATTACK SCENARIOS ON SYSTEM OF REMOTE EDUCATION
DOI:
https://doi.org/10.18372/2225-5036.30.19246Keywords:
system of remote education, watermark, steganorgaphy, data format, feedback, sharing the secret, match search, optical character recognition (OCR)Abstract
The development of both the violator model and threat model is required for protection of information system from potential harmful influence. Harmful influence can be caused by accident (by its legit users) or intentionally (by violators). Each model is an abstraction and the level of detail of this abstraction is determined by a few factors. One such factor is the object of protection. Systems of remote education are used by people in a wide range of ages – from 1st grade school students to adult university/college students, while the range of objects of attacks include educational materials and user accounts that contain personal data. The specifics of functioning of systems of remote education accounts for processing data in different formats and interactive, synchronous and asynchronous interaction of users who can have different roles in the system. One should also expect the abuse of main functions executed by legit users of the system and to watch over restriction of access to the system from external network.
References
Diehl E. – Securing Digital Video:Techniques for DRM and Content Protection. 2012. DOI: 10.1007/978-3-642-17345-5_1, Springer-Verlag Heidelberg, ISBN-10 : 3642434886, ISBN-13 : 978-3642434884
M. Asikuzzaman and M. R. Pickering, "An Overview of Digital Video Watermarking," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 9, pp. 2131-2153, Sept. 2018, doi: 10.1109/TCSVT.2017.2712162. keywords: {Watermarking;Streaming media;Motion pictures;Three-dimensional displays;Copyright protection;Internet;Robustness;Watermarking;robustness;geometric attack;depth-image-based rendering (DIBR);multi-view video}
Liu, Yunxia & Liu, Shuyang & Wang, Yonghao & Zhao, Hongguo & Liu, Si. (2018). Video Steganography: A Review. Neurocomputing. 335. 10.1016/j.neucom.2018.09.091.
Beimel, Amos. (2011). Secret-Sharing Schemes: A Survey. Coding and Cryptology. 11-46. 10.1007/978-3-642-20901-7_2.
Paul Heckel. 1978. A technique for isolating differences between files. Commun. ACM 21, 4 (April 1978), 264–268. https://doi.org/10.1145/359460.359467
A. Zramdini and R. Ingold, "Optical font recognition using typographical features," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 877-882, Aug. 1998, doi: 10.1109/34.709616. keywords: {Optical character recognition software;Character recognition;Optical sensors;Bayesian methods;Text recognition;Image recognition;Text analysis;Feature extraction;Robustness;Optical design},
Perwej, Dr. Yusuf & Hannan, Shaikh Abdul & Asif, Ali & Mane, Arjun. (2014). An Overview and Applications of Optical Character Recognition. International Journal of Advance Research In Science And Engineering (IJARSE). Vol. 3. Pages 261- 274.
John Barkley. 1997. Comparing simple role based access control models and access control lists. In Proceedings of the second ACM workshop on Role-based access control (RBAC '97). Association for Computing Machinery, New York, NY, USA, 127–132. https://doi.org/10.1145/266741.266769
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.