A Review of Security Threats by The Unauthorized in The E-Learning

Authors

  • Mohamed Munser Saleh

DOI:

https://doi.org/10.24297/ijct.v14i11.1808

Keywords:

Keyword, unauthorized, threats, E-learning security.

Abstract

Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials. In today's focused world, each Organization is endeavoring to enhance its proficiency and guarantee the nature of data asset. Computer networking technologies - intranet, web - have progressed to the point where data can be put away, transmitted, and available to people accessing the resource anytime and from anywhere.  These advantages additionally push organizations into executing web based innovation without considering the security dangers that this involves.

Downloads

Download data is not yet available.

Downloads

Published

2015-08-11

How to Cite

Saleh, M. M. (2015). A Review of Security Threats by The Unauthorized in The E-Learning. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 14(11), 6240–6243. https://doi.org/10.24297/ijct.v14i11.1808

Issue

Section

Research Articles