S. KAVUN ET AL.
7) Confirma
and CAPTCHA tech-
no
Conclusion
Thus, the introductionbove key elements will
be deleted and if not protected, and then at least significantly
re
ok): the copy-
tio
): such an achieve-
th
te of users’ personal data protection or other subject
th
will compete in the global market: the use of
be
tion of content validity;
8) Implementation of micro printed
logies.
All disputes or created by the negative aspects of information
security (Rezgui, 2007) entail the emergence of aspects of eco-
nomic security, which together form the financial (monetary)
loss. This is confirmed by the following numbers according
to data 2010-2011: the numbers of stolen records of personal
data—3.9 million per year; increase in the number of inci-
dents—1.5 - 2 times per year; costs for the organization to
support the information and economic security—127 hours per
month; proportion of organizations having problems using the
password—90% (Kavun, 2011).
What is the financial side of safety? For example, we present
a few numbers that characterize this side. Hacking website or
forum costs only $50 (at a cost to build $300 - $5000). The
question immediately arises, “Is it worth then to spend money
on creating a website?” The cost of a single account—$20 - $25
(considering the total amount of $80 million per year, it’s the
market earning crackers). Spam mailing costs from 50 up to
$ 200, depending on the volume of distribution. But this is the
cheapest way of public relations, advertising, which can lead to
the collapse of a marketing plan for the enterprises or other
organizations. Breaking the mailbox costs from $15 to $50, and
this can be everyone’s mailbox. At the same time other statis-
tics show that about 45% of the information in the category of
trade secret is transmitted by e-mail (Kavun, 2011).
To prevent these threats of unauthorized access, which is de-
fined as access to information that is in violation of established
rules of access permissions in the automated system, a neces-
sary condition for a modification of DLS aiming at the im-
provement the level of information security (Kavun, 2007).
Such improvement is possible when using the ISS.
ISO/IEC 15408 “Information technology—Security techniques
—evaluation criteria of information security,” and the ISO/IEC
17799 “Information security management”, and takes into con-
sideration trends in the regulatory framework for information
security.
Therefore, because the DLS revealed several threats of un-
authorized access, it should form and hold complex of means
and measures (countermeasures) that would have eliminated all
points of risk threats implementation.
Thus, the influence aspects of information and economic se-
curity development on DLS become obvious.
The use of watermarking technology in conjunction with the
micro text will uniquely identify the authorship of content,
therefore, will help to protect copyrights. Tools of WEB-vali-
dation confirm the stability of the code, the absence of mali-
cious content, which ultimately leads to an increase of the
credibility of the submitted materials, increases the rating and
increases revenue. Authorization prevents from third-party de-
velopers claim or simply swindlers on the authorship, sue. Te-
chnology CAPTCHA (e.g., graphic interpretation) eliminates
the effects of but autodialers, thus ensuring the objectivity of
the statistics show, the audience and increase the degree of
confidence. A reasonable hosting involves correct and optimal
choice of provider (host) and provides the complex of the re-
sources and technologies, which lead to an increase of popula-
tion density, increase of functionality, increase of obtaining and
providing opportunities.
and use of the a
duce the impact of the consequences of negative impacts in
the areas of information and economic security:
1) Receive (or adjust) the value of content (such as for resale,
we can give you an example from the Facebo
righting is widely developed nowadays. In many countries for
copyrighting no punishment or fine are provided for. Besides, it
is very difficult to see and prove the commission of this act. It
all cause significant damage to the owners of educational re-
sources, although most of the material have a public access.
2) Protect their copyrights (intellectual) rights: also it is a
difficult question, which requires deep knowledge of interna-
nal legal rights and results of litigation of violations and
what is the most important, compensation for violation in copy-
righting protection. In this aspect knowledge of the information
will significantly facilitate the possible consequences based on
results of trials in copyright confirmation.
3) Can enter the world market (the same example with
Facebook, if you remember how it all began
ment will have a positive influence on the company image,
profit and rating; extend sphere of influence in their territory of
activity. Besides, entering the global market is a natural desire
(and international recognition) of any enterprises, including
educational institutions.
4) Increase the ratings of educational institutions (due to the
implementation of instructions of Ukrainian President to join
e world rankings): for university to be in the rating (at the
high position) has always a positive influence on the rating and
the image of the university, providing the increasing of appli-
cants number (due to the bigger importance and prestige), rais-
ing the status as a participant of different project, increasing the
degree of belief and recognition of domestic and foreign uni-
versities.
5) Protect personal data and to ensure existing regulations:
current sta
of educational activity entities requires providing a sufficient
attention, the necessary funds and resources for preventing their
leak (substitution, unauthorized access or other negative im-
pact). Otherwise university takes a risk of significantly reduc-
ing their image or rate or to stop the existence.
6) Jointly raise the level of e-learning: as a result of the in-
troduction and use of the above recommendations will increase
e level of e-learning, put this form of training together with
other forms to the appropriate location, and provide further
practical use.
7) Establish a system of (complex) multimedia teaching
systems, which
such system is a requirement of the modern world; because the
technological development makes to implement various multi-
media technologies to help the learning process goes to a new,
higher level. In addition, they make possible the increasing of
distance education level if general, to facilitate its use and, thus,
attract more participants into the education process. Modern
multimedia technologies allow to present material to study
more clearly and simply and moreover they can make the proc-
ess dynamic.
Thus, distance education, which becomes obvious reality in
the modern world and in the near future will develop most rapidly,
cause only through economic and technological advantages
of this model can be satisfied with a huge demand for higher
education, expected in developing countries. The optimal way
of this development is creation of DLS, which based on
Copyright © 2012 SciRes.
90