Cyber Security Featuresfor National E-Learning Policy Alya Geogiana Buja, Noor Afni Deraman, Siti Daleela Mohd Wahid, Mohd Ali Mohd Isa
Cyber Security Featuresfor National E-Learning Policy Alya Geogiana Buja, Noor Afni Deraman, Siti Daleela Mohd Wahid, Mohd Ali Mohd Isa
Cyber Security Featuresfor National E-Learning Policy Alya Geogiana Buja, Noor Afni Deraman, Siti Daleela Mohd Wahid, Mohd Ali Mohd Isa
5 (2021), 1729-1735
Research Article
Cyber Security Featuresfor National E-Learning Policy
Alya Geogiana Buja1*, Noor Afni Deraman2, Siti Daleela Mohd Wahid3, Mohd Ali Mohd
Isa4
124
Faculty of Computer & Mathematical Sciences, Universiti Teknologi MARA, Malaysia
3
Faculty of Business Management, Universiti Teknologi MARA, Malaysia
geogiana@uitm.edu.my1
Article History: Received: 11 January 2021; Accepted: 27 February 2021; Published online: 5 April 2021
Abstract: This paper proposes cybersecurity features in the National e-Learning policy. Cybersecurity in the
learning environment is becoming an issue that has been considered by the community. DePAN 1.0 and DePAN
2.0 policies have not been carefully planned in any related security concerns. Amongst security domains in e-
learning are authentication and accountability, access control, and non-repudiation issues. However, as the
functionality of e-learning is expanding, information must be actively protected in this bigger context to avoid
the loss of its confidentiality, integrity, and availability. Therefore, the existing policy and guidelines on e-
learning have been studied thoroughly. A very feasible study has been conducted on the existing literature and
related works to e-learning and e-learning. The security threats are also reviewed in this paper. Based on the
established e-Learning policy, therefore, the proposed security features are namely (CSF1) authentication and
accountability, (CSF2) access control, (CSF3) protection of communication, and (CSF4) non-repudiation issues.
The findings from this study can be added to the implementation of e-learning in the future.
Keywords: Cybersecurity, e-Content, e-Learning, Security policy.
1. Introduction
The urged by the Ministry of Education (MOE) to switch the teaching & learning from the traditional
classroom to advance online classes at higher learning institutions (HLIs) due to the pandemic crisis is an eye-
opener to everybody. Statistically, 36% out of 86,672 students reported not completely ready for online-learning
[1]. But the learning process must be continued. Due to the pandemic, many HLIs have also slowly changed over
the last forty years in consideration of policy drivers, such as widening participation, long-life learning, and
quality assurance [2]. The environment of the study has been migrated to Open Distance Learning (ODL). ODL
is defined as a method of learning that more to self-learning which fully utilize the information technology and
the Internet. The participants of e-learning have to share the learning and teaching materials on the Internet;
accessible only at anytime and anywhere. The National e-Learning Policy (DePAN 1.0 and DePAN 2.0) [3,4,5]
are very much needed as both are the guideline for e-learning environment in Malaysia.
However, the cyber-attack is increasing gradually with the evolvement of information technology. The
demand for using the e-learning platform is high because of the changing teaching method and learning of all
learning institutions worldwide. As a result of this increasing interconnectivity, information is now exposed to a
growing number and a wider variety of threats and vulnerabilities. As such, information must be protected to
avoid losing its confidentiality, integrity, and availability.
Several cyber-attacks could compromise the e-learning environment that might be harmful to the information
and the user, such as spreading viruses and worms over the Internet. Besides, with the universal connectivity,
unauthorized access or the user's data can be collected without their knowledge. For the learning and teaching
material, the attack on intellectual property can happen. From time to time, the type of cyber-attack appears in a
different form.
With that in mind, this paper proposes four cybersecurity features to be embedded in the National e-Learning
Policy. In Section 2.0, this paper reviews the National e-Learning Policy, security issues in the e-learning
system, and the relationship of E-learning and information security management. Section 3 briefly explains the
method of this study, and Section 4 presents the proposed cybersecurity features of the National e-Learning
Policy, and the conclusion is presented in Section 5.
2. Related literature
This section discusses related and relevant literature to the study. Section 2.1 reviews on National e-Learning
Policy and Section 2.2 discusses security issues in the e-learning system. Meanwhile, Section 2.3 explains the
relationship between e-learning and information security management.
A. National e-Learning Policy
1729
Cyber Security Featuresfor National E-Learning Policy
In Malaysia, there are two existing policies related to e-learning implementation. Unfortunately, both policies
have not cautiously investigated each domain's security assessment in the National e-Learning Policy, even in
DEPAN 2.0 (refer Figure 1).
The first National eLearning Policy, or in the Malay language, Dasar e-Pembelajaran Negara (DePAN) was
enacted in 2011 to provide a framework and direction for eLearning implementation in higher education. It
focuses on collaborative learning, which became the teaching and learning philosophy and could even provide
career options and much more [6]. Previously, DePAN 1.0 was constructed with five pillars: Infrastructure,
Organizational Structure, Curriculum and e-content, Professional Development, and Acculturation. Later,
DEPAN 1.0 has been revised to DEPAN 2.0 and enhanced with six pillars: Infrastructure and Infostructure,
Governance, Online Pedagogies, e-Content, Professional Development, and Acculturation.
Shifting DePAN 1.0 to DePAN 2.0 is a never-ending story when ignoring the elements of information
security. Information security is needed to protect all shared information from threats. With advanced
technology, information can easily be manipulated, hacked, and stolen. Therefore, understanding the idea of
information security is a must in executing ODL.
1730
Alya Geogiana Buja1*, Noor Afni Deraman2, Siti Daleela Mohd Wahid3, Mohd Ali Mohd Isa4
3. The methodology
This study is conducted in three phases: feasibility study, threat analysis, and cybersecurity feature
identification. During the feasibility study, the National e-learning Policy was studied thoroughly by looking
and analyzing each pillar's security element. Based on the study, not all pillars can be embedded with the
security features. For DEPAN 2.0, three pillars have been identified that can be improvised with the
cybersecurity features, which are P1 - Infrastructure and Infostructure, P2 – Governance, and P4 - e-Content.
Once the suitable pillars have been identified, all related information about the pillars is gathered. The
purpose of this activity is to identify the security threats that can be happened in the e-learning ecosystem if the
pillar is not secure.
Lastly, based on the threat analysis, the cybersecurity features are proposed.
1731
Cyber Security Featuresfor National E-Learning Policy
This poses a problem because as technology advances and attackers become smarter and technologically
savvy, using a password makes intrusion very achievable for the attacker since learners have a problem
remembering a long and complex password. They often resort to using simple password [7]. Clearly, a solution
that not dependents on a password alone but also utilize current technology is needed for LMS.
One possible solution is by enabling the use of Two (2) Factors Authentication (2FA) during the login
process. During 2FA, users are sent code to their mobile phone, which is required for authentication; this code is
required to be submitted along with the username and password.
This adds another layer of security, even if the password was compromised. Those who may have problems
with internet access or connection can also opt to use a 2FA authenticator app such as Google Authenticator or
Authy, which uses time-based to generate code instead. According to Google, by adding 2FA alone will block
100% automated bot hacks [9], which is one of the automated attacks carried out by attackers to gain access to
an account.
Although it is clear that 2FA is necessary to improve authentication, many LMS are still behind in
implementing 2FA. Based on the list at [10], which reviews the top 10 learning management systems (LMS),
only 4 out 10 LMS currently support 2FA: Moodle, Canvas, Blackboard and Google Classroom. If we look
further at twofactorauth.org (2020) , which list website support for 2FA, there are still many websites related to
online-learning that still have no support for 2FA, such as Coursera, Edmodo, edX, and Udemy.
Hopefully, this trend will change, and more LMS will start to support the use of 2FA since an online-learning
authentication is very important because it relates to the second component of security, which is accountability.
Accountability refers to the ability to tie user with the action performed by the user. So that we can be sure that it
is the user that submitted the assignment or takes the online assessment.
B. Access Control
As with any other online system, users are given privileges based on their account. These privileges are
generally tied to the role given to the user. The role will then determine the action that can be carried out by the
users, also known as access control or role-based access control, since the role will determine the level of access.
In older versions of LMS and in most cloud based LMS, a fixed set of roles was used to simplify the LMS
usage [11]. These roles are normally separated into three groups, which are administrators, teachers, and
students, and no new roles can be created. This generalization of privileges is problematic because it does not
allow fine-grained control of users' permission. For instance, an administrator would normally be given all
access to the system and is given too much control. Perhaps the administrator can be grouped into administrator
for user, administrator for the course, and administrator for faculties. This limit in access will control the amount
of access that a user has when an account is compromised.
1732
Alya Geogiana Buja1*, Noor Afni Deraman2, Siti Daleela Mohd Wahid3, Mohd Ali Mohd Isa4
Newer versions of LMS such as Moodle and edX allow finer control of permissions to be assigned to a newly
created role. This should be able to overcome the problem with a compromised account having all permissions.
Care though should be taken when creating a new role and when assigning tasks to the role. Some of the security
that may arise with the wrong permission setting is (i) users are allowed access to other users' confidential data
or (ii) users can send messages to all users, which may contribute to spamming. A balance access control is
essential in e-learning to ensure that users are given the right permission to accomplish their tasks.
Figure 4: P2 - Governance
C. Protection of Communications
In traditional online learning, communications are normally carried out in an asynchronous mode via chat
module or discussion in the LMS forum module. This is due to limitations of available bandwidth in delivering
voice or video. So then, the security of communications depends on the security of the database in protecting the
data.
As technology advance and more bandwidth are available for both home users and mobile users, online
classes and discussions can be performed synchronously between teachers and students. Although the video
conference platform has been around since the 90s, Webex for instance, was launch in 1995, the pandemic has
created a demand for an easy to use video conferencing software. Some of the well-known video conferencing
software are Webex, Microsoft Teams, Google Meet, and Zoom.
1733
Cyber Security Featuresfor National E-Learning Policy
This led to security problems because since users must install the applications on their devices, the
applications may have some vulnerability that will expose the device to attackers and later be compromised. List
of vulnerabilities includes:
a. Remote code execution (RCE) is where attackers can execute code on the remote machine and
ultimately have complete access and control to the machine.
b. Session hijacking – vulnerability allows attackers to send messages that will perform certain actions
such as sending messages on behalf of the users, removing the users from the meetings, or even hijacking the
screen being shared [12].
c. Zoombombing is also known as zoom raiding. It is when unwanted users (normally internet trolls or
hackers) can join a video conference call and hurl racial slurs, profanity, or even shares offensive images.
Although this is not a software security vulnerability, it is still a problem with how Zoom handles public meeting
links [13].
d. Eavesdropping – this is the ability of attackers to listen to the conversation.
e. Privacy – since some video conferencing applications are offered free to users, the company often
makes money by mining user data. This may be of concern if a company or organization uses the application.
As we can see above, many issues come with the popularity of video conferencing software; as a guide, we
would like to offer the following recommendations to users:
a. End-to-end encryption – Some applications provide supported for E2E, which means that the
encryption is between end devices to another end device. Any intermediary device or node along the
communications channel will not be able to eavesdrop on the conversation. It is highly recommended that
applications that support E2E are used.
b. Keep the software updated – Always enable automatic checking of an update for the software and
update it when an update is available.
c. On-demand installation – If the software is only used for a few times a week, one can install the
software when required and uninstall it once it has been used. This will minimize vulnerabilities causes by
remote code execution.
As with any other software category, video conferencing applications will soon become mature and contain
fewer vulnerabilities. Until then, users are advised to take extra precautions when using the software.
D. Non-repudiation
In an online transaction, it is essential that a user can be held responsible for the action that they had carried
out. In cybersecurity, this is known as non-repudiation, which provides proof of the origin of the data and its
integrity. Certain activities in ODL require non-repudiation to be implemented, especially for activities that
influence grading, such as submitting an assignment or taking a quiz. Hence logging mechanisms that record all
users' activities are required.
However, most of the loggings rely on user authentication and access-control to link users to their respective
activities. This may not be adequate since an action can be carried out by a compromised account, which may
unfairly punish the user. Also, non-repudiation can also occur outside of the LMS, such as users sharing
confidential materials to the public. As a recommendation, it is suggested that the following are implemented:
a. For administrators, critical activities such as adding, editing, and removing users are recorded as well as
generating triggers for other administrators. This is so that the actions can be evaluated later by others if a
problem arises.
b. For assignment submission or answering the quiz, digital signatures can be used to ensure the
submission's integrity.
c. For unauthorized distributions of materials, digital watermarking can be used to track the person
responsible.
By following the guide above, we should minimize the security issue related to the repudiation attack.
Figure 5: P4 - e-Content
1734
Alya Geogiana Buja1*, Noor Afni Deraman2, Siti Daleela Mohd Wahid3, Mohd Ali Mohd Isa4
4. Conclusion
In conclusion, this paper presents the cybersecurity features in the National e-Learning policy. Due to the
COVID-19 pandemic, e-Learning has been taken into consideration by all learning institutions worldwide. This
study has feasibly studied the National e-Learning Policy and found that the security features could be added to
the policy. E-learning requires a cyber platform to execute the business process, and the platform has to be
secured for the users to communicate the data. Therefore, four cybersecurity features have been proposed in this
paper, namely (CSF1) authentication and accountability, (CSF2) access control, (CSF3) protection of
communication, and (CSF4) non-repudiation issues with hardening the three pillars; P1 - Infrastructure and
Infostructure, P2 – Governance and P4 - e-Content. The proposed cybersecurity features have been analyzed in
terms of the implementation based on the identified pillars of the National e-Learning Policy. For future work,
the next step in this research project is to conduct the preliminary survey to obtain the effectiveness of the
proposed enhancement of cybersecurity features in the National e-Learning Policy.
Acknowledgements
Sincere appreciation goes to Universiti Teknologi MARA Cawangan Melaka for the support given to this
research endeavor, TEJA: Internal Grant (GDT2020-17).
References
1. Bahagian Hal Ehwal Akademik. (2020). Laporan Ketersediaan Pelajar Bagi Pembelajaran & Pengajaran
Dalam Talian Universiti Teknologi MARA.
2. Najwa Hayaati, M.A. & Ip-Shing, F. (2010). E-Learning and Information Security Management.
International Journal of Digital Society, 1(2), 148-156
3. Dasar e-Pembelajaran Negara. Retrieved at http://www.ukm.my/jurutera/wp-
content/uploads/2016/07/e-Pembelajaran-Negara.pdf on 10th of May 2020.
4. Dasar e-Pembelajaran Negara 2.0. Retrieved at
http://www.cade.upm.edu.my/dokumen/PTPA1_DePAN_v2.pdf on 10th of May 2020.
5. Ministry of Education Malaysia. (2020). Malaysia education blueprint 2015–2025: Executive summary.
6. Buletin Pembangunan Akademik UKM (2011). Retrieved at http://www.ukm.my/ctlt/wp-
content/media/Bulletin/PPA_bil_6.pdf on 10th of May 2020.
7. Salimovna, F., Yuldasheva, N. & Ugli, I. (2019). Security issues in E-Learning system. 1- 4.
10.1109/ICISCT47635.2019.9011971.
8. Rozhan, M.I., Nurkhamimi, Z., Najwa Hayaati, M.A. Ahmad Farid, M.J. & Eznie Zahirah, M. (2017).
Towards National Policy Guidelines on Open Educational Resources in Malaysia. Vancouver, Canada:
Commonwealth of Learning. pp: 1-57.
9. Anonymous. (2020). Two Factor Auth (2FA) (2020). Retrieved at https://twofactorauth.org/#education
10. Fenton, W. (2018). The Best (LMS) Learning Management Systems for 2018.
11. 11. Skripak, I. A., Aynazarova, S. N., Vladimirovna, E., Tkachenko, A. E., & Erina, L. S. , Digital
Virtualization Technologies in Distance Learning, Advanced Trends in Computer Science and
Engineering Available, 9(2), 1808–1813, 2020. Available Online at
http://www.warse.org/IJATCSE/static/pdf/file/ijatcse138922020.pdf
12. Thomas, K., and Moscicki, A. (2019). New research: How effective is basic account hygiene at
preventing hijacking. Retrieved at https://security.googleblog.com/2019/05/new-research-how-
effective-is-basic.html.
13. REISINGER, D. (2020). Zoom Bug Gives Hackers Full Control Over ComputersWorse yet, there's
apparently no fix. Retrieved at https://www.inc.com/don-reisinger/zoom-bug-gives-hackers-full-
control-over-computers.html.
1735