Advertisement

Information Security Threats Analysis for E-Learning

  • Najwa Hayaati Mohd Alwi
  • Ip-Shing Fan
Part of the Communications in Computer and Information Science book series (CCIS, volume 73)

Abstract

The purpose of this paper is to investigate and define the information security threats in e-learning environment. A threat analysis has been conducted for each application in Managed Learning Environment (MLE) system used in e-learning. The threats analysis was conducted according to the approach adapted from Microsoft. This study produce a list of information security threats per application used in e-learning and a matrix of threats’ risk for e-learning. This study focused on vulnerabilities in application system and do not cover the vulnerabilities in host and network in e-learning. Thus, this study has revealed the information security threats specifically for applications in e-learning environment. The results of the threats analysis can be used as guidance to e-learning provider in implementing e-learning security strategy. The results can also be a guide for the e-learning users to increase their awareness on the potential threats in e-learning environment.

Keywords

Threats analysis E-learning Application system Information security threats Matrix of threats’ risk 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Allen, E., Seaman, J.: Online Nation Five Years of Growth in Online Learning, vol. 1 (2007)Google Scholar
  2. 2.
    Barbeau, M.: WiMax/802.16 Threat Analysis, pp. 8–15 (2005)Google Scholar
  3. 3.
    Boella, G., van der Torre, L.: Security Policies for Sharing Knowledge in Virtual Communities. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans 36, 439–450 (2006)CrossRefGoogle Scholar
  4. 4.
    Bruns, R., Dunkel, J., von Helden, J.: Secure Smart Card-Based Access to an e-Learning Portal. In: Proceedings of the 5th International Conference on Enterprise Information Systems (ICEIS), Angers, France (2003)Google Scholar
  5. 5.
    Conole, G., Smith, J., White, S.: A critique of the impact of policy and funding. In: Conole, G., Oliver, M. (eds.) Contemporary Perspectives in E-Learning Reserach Themes, Methods and Impact on Practice, pp. 38–54. Routledge, London (2007)Google Scholar
  6. 6.
    El-Khatib, K., Korba, L., Xu, Y., et al.: Privacy and Security in E-Learning. International Journal of Distance Education Technologies 1, 1–19 (2003)CrossRefGoogle Scholar
  7. 7.
    Graf, F.: Providing Security for eLearning. Computers & Graphics 26, 355–365 (2002)CrossRefGoogle Scholar
  8. 8.
    Gunasekaran, A., McNeil, R.D., Shaul, D.: E-Learning: Research and Applications. Industrial and Commercial Training 34, 44–53 (2002)CrossRefGoogle Scholar
  9. 9.
    Jalal, A., Zeb, M.A., Peshawar, P.: Security Enhancement for e-Learning Portal. International Journal of Computer Science and Network Security 2, 236 (2008)Google Scholar
  10. 10.
    Kennedy, G.: E-Learning Intellectual Property Issues in E-Learning. Computer Law & Security Report 18, 91–98 (2002)CrossRefGoogle Scholar
  11. 11.
    Lim, C.C., Jin, J.S.: A Study on Applying Software Security to Information Systems: E-Learning Portals. IJCSNS 6, 162 (2006)Google Scholar
  12. 12.
    Littman, M.K.: Guidelines for Network Security in the Learning Environment. Journal of Instruction Delivery Systems 10, 35–40 (1996)Google Scholar
  13. 13.
    Norman, S., Da Costa, M.: Overview of e-Learning Specifications and Standards. Open Learning Agency, and Eduspecs Technical Liaison Office (2003)Google Scholar
  14. 14.
    Patterson, D., Jung, G., Broadhead, G.: The UK e-Learning Market 2009, p. 17 (2009)Google Scholar
  15. 15.
    Raitman, R., Ngo, L., Augar, N.: Security in the Online E-Learning Environment. Advanced Learning Technologies. In: Fifth IEEE International Conference on Advanced Learning Technologies, ICALT 2005, pp. 702–706 (2005)Google Scholar
  16. 16.
    Ramim, M., Levy, Y.: Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University. Journal of Cases on Information Technology 8, 24–34 (2006)CrossRefGoogle Scholar
  17. 17.
    Samuels, R.: The Future Threat to Computers and Composition: Nontenured Instructors, Intellectual Property, and Distance Education. Computers and Composition 21, 63–71 (2004)CrossRefGoogle Scholar
  18. 18.
    Saxena, R.: Security and Online Content Management: Balancing Access and Security. Breaking boundaries: integration and interoperability. In: 12th Biennial VALA Conference and Exhibition Victorian Association for Library Automation (2004)Google Scholar
  19. 19.
    Siponen, M., Willison, R.: Information Security Management Standards: Problems and Solutions. Information & Management 46, 267–270 (2009)CrossRefGoogle Scholar
  20. 20.
    Yang, C., Lin, F.O., Lin, H.: Policy-Based Privacy and Security Management for Collaborative E-Education Systems. In: Proceedings of the 5th IASTED International Multi-Conference Computers and Advanced Technology in Education (CATE 2002), pp. 501–505 (2002)Google Scholar
  21. 21.
    Yong, J.: Digital Identity Design and Privacy Preservation for e-Learning. In: Shen, W., Yong, J., Yang, Y., Barthès, J.-P.A., Luo, J. (eds.) CSCWD 2007. LNCS, vol. 5236, pp. 858–863. Springer, Heidelberg (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Najwa Hayaati Mohd Alwi
    • 1
  • Ip-Shing Fan
    • 1
  1. 1.Cranfield UniversityUnited Kingdom

Personalised recommendations