电子学习环境中的安全考虑和双因素身份验证机会

G. Márton, A. David
{"title":"电子学习环境中的安全考虑和双因素身份验证机会","authors":"G. Márton, A. David","doi":"10.1109/ICETA.2014.7107604","DOIUrl":null,"url":null,"abstract":"In today's fast-paced world access to the right information for the right person at the right time is critical, and it is not necessarily related to business life. The same applies to students using e-learning systems and contents. As there are seemingly never-ending news reporting different types of security vulnerabilities and exploits on a daily basis, security and privacy have become top priorities. People are forced to share confident and sensitive information through different services on the internet, while relying on the security they offer can be misleading at best. Even if strong and complex passwords are required from the users, there is no guarantee that even the underlying protocol or services do not contain any security vulnerabilities. So it is extremely important to realize that other factors must be involved during the authentication process without making it too complicated for the everyday use. In this paper the more and more popular two-factor authentication method is proposed as a reasonable and promising solution, and an example is also given how it can be implemented for e-learning systems currently available.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security considerations and two-factor authentication opportunities in e-learning environments\",\"authors\":\"G. Márton, A. David\",\"doi\":\"10.1109/ICETA.2014.7107604\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's fast-paced world access to the right information for the right person at the right time is critical, and it is not necessarily related to business life. The same applies to students using e-learning systems and contents. As there are seemingly never-ending news reporting different types of security vulnerabilities and exploits on a daily basis, security and privacy have become top priorities. People are forced to share confident and sensitive information through different services on the internet, while relying on the security they offer can be misleading at best. Even if strong and complex passwords are required from the users, there is no guarantee that even the underlying protocol or services do not contain any security vulnerabilities. So it is extremely important to realize that other factors must be involved during the authentication process without making it too complicated for the everyday use. In this paper the more and more popular two-factor authentication method is proposed as a reasonable and promising solution, and an example is also given how it can be implemented for e-learning systems currently available.\",\"PeriodicalId\":340996,\"journal\":{\"name\":\"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"volume\":\"155 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETA.2014.7107604\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA.2014.7107604","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当今快节奏的世界中,在正确的时间为正确的人获得正确的信息是至关重要的,它不一定与商业生活有关。这同样适用于使用电子学习系统和内容的学生。由于每天都有似乎永无止境的新闻报道不同类型的安全漏洞和利用,安全和隐私已成为重中之重。人们被迫在互联网上通过不同的服务分享自信和敏感的信息,而依赖他们提供的安全至多可能会产生误导。即使要求用户提供强而复杂的密码,也不能保证底层协议或服务不包含任何安全漏洞。因此,认识到在身份验证过程中必须涉及其他因素,而不是使其过于复杂,这一点非常重要。本文提出了目前越来越流行的双因素认证方法,作为一种合理而有前途的解决方案,并给出了如何在现有的电子学习系统中实现双因素认证的实例。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security considerations and two-factor authentication opportunities in e-learning environments
In today's fast-paced world access to the right information for the right person at the right time is critical, and it is not necessarily related to business life. The same applies to students using e-learning systems and contents. As there are seemingly never-ending news reporting different types of security vulnerabilities and exploits on a daily basis, security and privacy have become top priorities. People are forced to share confident and sensitive information through different services on the internet, while relying on the security they offer can be misleading at best. Even if strong and complex passwords are required from the users, there is no guarantee that even the underlying protocol or services do not contain any security vulnerabilities. So it is extremely important to realize that other factors must be involved during the authentication process without making it too complicated for the everyday use. In this paper the more and more popular two-factor authentication method is proposed as a reasonable and promising solution, and an example is also given how it can be implemented for e-learning systems currently available.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信