Cyber Security Concerns in E-Learning Ed PDF
Cyber Security Concerns in E-Learning Ed PDF
Cyber Security Concerns in E-Learning Ed PDF
Abstract
Cyberspace refers to the boundless space known as the Internet. Cyber security is the body of rules
put in place for the protection of this cyberspace. The increasing use of e-Learning systems has been
documented by numerous studies and shows continuing growth; little attention has been given to the
issue of security of e-Learning systems both in research and education.
In this paper, we illustrate an approach to understanding, evaluating, monitoring, measuring and
managing cyber security as it relates to e-Learning systems. Security of e-Learning systems
represents a unique challenge as numerous systems are accessed and managed via the Internet by
thousands of users over hundreds of networks. Moreover, this paper reveals the prevalence of internal
cyber-attack as well as a lack of proper IT policies and procedures in e-Learning systems, in light of
their standard architecture and their specific security requirements.
Also, we discuss the most important security challenges that can be relevant for distributed e-Learning
systems. Because e-Learning systems are open, distributed and interconnected, then security
becomes an important challenge in order to ensure that interested, and authorised, actors only have
access to the right information at the appropriate time.
Keywords: Cyber security, e-Learning systems, cyber-attack, IT policies, distributed e-Learning.
1 INTRODUCTION
E-Learning is widely used as a method of learning that ultimately depends on the Internet in its
execution. E-Learning systems epitomise computing systems and networks of the Internet generation.
These systems are complex and they aim to guarantee the satisfaction of the learner and maintain the
good image of the learning process. There is clear evidence that innovative educational technologies,
such as e-Learning, provide unprecedented opportunities for students, trainees and educators to
acquire, develop and maintain core skills and essential knowledge [1]. However, e-Learning systems
employ the Internet as a place to obtain all necessary information and knowledge. Unfortunately, the
Internet has also become the venue for a new-fangled set of illegal activities, so-called cyber-crime.
Information associated with the e-Learning environment, some of which might be personal, protected
or confidential in nature, is then continuously exposed to security threats because e-Learning systems
are open, distributed and interconnected.
E-Learning has gone through a spectacular development during the past years [2]. E-Learning
systems are diverse and widespread, with examples including WebCT, Moodle and Blackboard. They
are large and dynamic with a variety of users and resources. The sharing of information, collaboration
and interconnectivity are core elements of any e-Learning system. Data must then be protected in
order to maintain confidentiality, integrity and availability. Protecting against data manipulation,
fraudulent user authentication and compromises in confidentiality are important security issues in e-
Learning. Meanwhile, e-Learning trends are demanding a greater level of interoperability for
applications, learning environments and heterogeneous systems.
The purpose of this paper is to provide an overview of the most important cyber security challenges
that are relevant to Higher Education systems and future distributed e-Learning systems. The main
sections will cover: cyber security and education; security threats, detection and protection in
distributed e-Learning systems; developing a security management model for e-Learning systems;
and, finally, some conclusions are presented.
0729
key system has the significant flaw that if the key is discovered or intercepted by someone else,
messages can easily be decrypted. For this reason, Public Key Cryptography and Public Key
Infrastructure is the preferred approach on the Internet.
2.4.3 Consumerisation of IT
IT consumerisation is driven by users who buy their own devices, use their own personal online
service accounts, install their own applications and then connect to the university or corporate network
with the device - often without the organisation's knowledge or approval. In the Higher Education
sector, an institution’s own consumerisation of IT has made the problem even more difficult to
manage. As users increasingly adopt their own devices for professional use, Higher Education
institutions will see more network security threats. In fact, the consumerisation of IT is driving the need
for network security solutions that can cover multiple types of devices and infrastructure components.
It is necessary to respond with security solutions that identify any consumer-adopted device, scan for
threats and deficiencies and then provision access or automatically remediate problems, regardless of
the type of device or location.
0730
• Authentication – broken authentication and session management; insecure communication.
• Availability – denial of service.
• Confidentiality attacks – insecure cryptographic storage; insecure direct object reference;
information leakage and improper error handling.
• Integrity attacks – buffer overflow; cross site request forgery; cross site scripting; failure to
restrict URL access; injection flaws; malicious file execution.
A threat is defined as a category of object, person or other entities that presents a danger, such as
Trojan horses or phishing. Schemes that involve password-based authentication of users are highly
susceptible to phishing attacks, which are becoming more and more sophisticated and require strong
preventative and countermeasures [12].
Rjaibi et al. [8] have also proposed and illustrated the use of a Mean Failure Cost (MFC) model for
managing and quantifying security threats, paying appropriate attention to: the basic architectural
components of an e-Learning system; the different stakeholders; the various security requirements;
the different types of security threats.
0731
Table 1: Protection against data manipulation, user authentication and confidentiality
• ARP cache poisoning and MITM attack • Installing firewalls and anti-virus software
• Brute force attack • Implementing Security Management (ISM)
• Cross-Site Request Forgery (CSRF) • Improving authentication, authorisation,
• Cross Site Scripting (XSS) confidentiality, and accountability
Figure 1: Managing cyber security threats in Higher Education institutions: process model for security
system
0732
The diagram shows how various stakeholders (staff and users) contribute to and are impacted by a
well-managed approach to cyber security in the organisation. Identification and specification of
requirements represents the input (from the left-hand side) to a process cycle with Plan, Implement,
Evaluate and Maintain stages. This Control cycle is continuing, repeating and goes through
appropriate amendments and iterations, in response to the information and intelligence available, such
that the output (on the right-hand side) is a managed security system. Effective stakeholder adoption,
with clear direction and expectations communicated from management about user responsibilities and
behaviour, is crucial for the success of such a security model.
All the Higher Education institutions should be aware of their duties regarding the protection of
institutional and research data and have appropriate measures in place to ensure that they are
compliant with the Data Protection Act (1998) [6]. Most of the Higher Education institutions will have
different structures for the management of data and research, and appropriate levels of oversight.
There will be a variety of data management policies and plans in operation, with very little
consideration given to errors. These features present a challenge for corporate governance to both
respect the issues and understand the real need for a process model to manage, control and mitigate
against employee cyber security threats.
Eventually, network security is a responsibility for the whole institution. Network administrators and
protectors can maintain up-to-date knowledge of threats and counter measures through exchange of
information with peers, government and others. The contribution of users cannot be underestimated in
the security of any network and related information. They must play a central role in evaluating the
risks posed to information, appreciating security priorities, and, finally, taking responsibility for the
implementation of controls [6].
5 CONCLUSIONS
The demand for e-Learning has changed the way in which Higher Education conducts its core
business of providing courses to various learners. Organisations must find and implement new
services that can enable students to study effectively and securely in a virtual environment. The
increased demand from e-Learners for flexibility, mobility and empowerment poses a significant
challenge to Higher Education IT departments, who are finding it harder to maintain control over how
data is used, stored and shared inside and outside the virtual class. The implementation of new
services, to meet demanding user needs, requires the building of secure, standardised, highly
available e-Learning environments, as well as centralised application management.
ACKNOWLEDGEMENT
This article was supported by work conducted under the Tempus European project entitled
'Enhancement of cyber educational system of Montenegro' (544088-TEMPUS-1-2013-1-SI-TEMPUS-
JPHES).
REFERENCES
[1] Scott P. and Vanoirbeek C. (2007). Technology-Enhanced Learning. Technology-Enhanced
Learning, vol. 71, pp. 12-13.
[2] Rabai L. B. A. and Rjaibi N. (2012). Quatifying Security Threats for E-learning Systems.
Education and e-Learning Innovations (ICEELI), 2012 International Conference, Tunis, Tunisia,
July,2012.
[3] ANON, (1998). Data Protection Act 1998; Bring your own device (BYOD) ICO, 1998. [Online].
Available:
http://ico.org.uk/~/media/documents/library/Data_Protection/Practical_application/ico_bring_you
r_own_device_byod_guidance.ashx [Accessed 20 09 2014].
[4] Moneo J. M., Caballe S. and Prieot J. (2012). Security in Learning Management Systems.
eLearning Papers, Catalonia, Spain.
[5] Johnson H. (2007). Dialogue and the Construction of Knowledge in E-Learning: Exploring
Students’ Perceptions of Their Learning While Using Blackboard’s Asynchronous Discussion
Board. European journal of open, distance and e-learning, no. ISSN 1027-5207.
0733
[6] ANON, (2013). Cyber security and universities: managing the risk Universities UK, November
2013. [Online]. Available: http://www.universitiesuk.ac.uk/highereducation/
Documents/2013/CyberSecurityAndUniversities.pdf [Accessed 25 09 2014].
[7] Nickolova M. and Nickolov E. (2007). Threat model for user security in e-leaning systems.
International Journal "Information Technologies and Knowledge", vol. Vol.1 / 2007 , p. 341.
[8] Rjaibi N., Rabai L. B. A., Aissa A. B. and Louadi M. (2012). Cyber Security Measurement in
Depth forE-learning Systems. International Journal of Advanced Research in Computer Science
and Software Engineering, vol. 2(11), pp. 1-15.
[9] Weippl E. R. (2005). Security in e-learning eLearn Magazine, 2005. [Online]. Available:
http://elearnmag.acm.org/featured.cfm?aid=1070943 [Accessed 25 09 2014].
[10] Anwar M. and Greer J. (2011). Role- and Relationship-based Identity Management for Privacy-
enhanced E-learning. The University of Saskatchewan, Department of Computer Science.
[11] Wolpers M. and Grohmann G. (2005). Technology Enhanced Learninig and Knowledge
Distribution for the Corporate World. Int J.Knowl, Learn, 2005.
[12] Sood S. K. (2012). Phishing Attacks: A Challenge Ahead. elearning papers, April 2012. [Online].
Available: http://www.openeducationeuropa.eu/en/paper/cyber-security-and-education
[Accessed 25 09 2014].
[13] May M. and George S. (2011). Privacy concerns in e-Learning: Is using a tracking system a
threat? International Journal of Information and Education Technology 2011, Volume 1, Number
1. [Online]. Available: http://liris.cnrs.fr/Documents/Liris-5266.pdf [Accessed 25 09 2014].
[14] Alw N. and Fan I.-S. (2010). E-Learning and Information Security Management. International
Journal of Digital Society, vol. Volume 1, no. Issue 2.
[15] Graf F. (2002). Providing security for eLearning. Computers & Graphics, vol. Vol.26, no. No.2,
pp. 355-365.
[16] Chen Y. and He W. (2013). Security Risks and Protection in Online Learning: A Survey. The
International Review of Research in Open and Distance Learning, 2013. [Online]. Available:
http://www.irrodl.org/index.php/irrodl/article/view/1632/2712 [Accessed 15 09 2014].
0734