SOCIETY & ”INDUSTRY 4.0”

Personal data security techniques in e-education

  • 1 AMEA, Institute of Information Technologies, Baku, Azerbaijan

Abstract

Keywords

References

  1. ] https://www.gartner.com/en/newsroom/press-releases/2018-08-15- gartner-forecasts-worldwide-information-security-spending-to-exceed- 124-billion-in-2019.
  2. V.V. Gafner, Informazionnaya bezopasnost / V.V. Gafner. - М.: Feniks, 2017. 336 s.
  3. P.P.Urbanovich. Informazionnaya bezopasnost i nadejnost sistem – Minsk: BGTU, 2007. 90 s.
  4. A.V.Vasilkov. Bezopasnost I upravleniye dostupom v informazionnix sistemax / A.V.Vasilkov, I.A. Vasilkov. - М.: Forum, 2017. 368 s.
  5. G. Gagne, P. B. Galvin, A. Silberschatz? Operating System Concepts, Publisher: John Wiley & Sons, 2012, p. 312.
  6. Z.A.Nosirov, I.M.Ajmuxamedov. Obnarujeniye XSS-uyazvimostey na osnove analiza polnoy karti web-prilojeniya. Sistemi upravleniya, svyazi I bezopasnosti. №1, 2018, s. 78-92.
  7. S. Fogie, J. Grossman, R. Hansen, A. Rager, P.Petkov. XSS attacks: Cross Site Scripting exploits and defense – Seth Fogie, Oxford: Elsevier Limited, 2007. 448 p.
  8. M. Denis, C. Zena, T. Hayajneh, “Penetration Testing: Concepts, Attack Methods, and Defense Strategies”, ISBN: 978-1-4673-8490-2, DOI: 10.1109/LISAT. 2016.
  9. Zashita informazii i nadejnost informazionnix sistem “Beloruskiy gosudarstvenniy texnologicheskiy universitet”. Metodicheskiye ukazaniya i kontrolniye zadaniya dlya studentov, Minsk, 2012. https://elib.belstu.by/bitstream/123456789/3372/1/zashhita-informacii-i-nadezhnost_-urbanovich-dlya-z.o..pdf.
  10. K. Ahmad, J. Shekhar, K.P. Yadav. Classification of SQL Injection Attacks. VSRD Technical & Non-Technical Journal Vol. I (4), 2010, рр. 236-242.
  11. Maraj, G.Jakupi, E.Rogova, Xh.Grajqevci, “Testing of network security systems through DoS attacks” , “Mediterranean Conference on Embedded Computing (MECO 2017), IEEE/Scopus conference, Montenegro, June 2017.
  12. Z. S. Alwan , M. F. Younis. Detection and Prevention of SQL Injection Attack: A Survey. International Journal of Computer Science and Mobile Computing, Vol.6 Issue.8, August- 2017, pp. 5-17.
  13. J. Clarke. SQL Injection Attacks and Defense. Elsevier, 2012, p.761.
  14. D.M. Romanenko.

Article full text

Download PDF