Information Security Threats Analysis for E-Learning
The purpose of this paper is to investigate and define the information security threats in e-learning environment. A threat analysis has been conducted for each application in Managed Learning Environment (MLE) system used in e-learning. The threats analysis was conducted according to the approach adapted from Microsoft. This study produce a list of information security threats per application used in e-learning and a matrix of threats’ risk for e-learning. This study focused on vulnerabilities in application system and do not cover the vulnerabilities in host and network in e-learning. Thus, this study has revealed the information security threats specifically for applications in e-learning environment. The results of the threats analysis can be used as guidance to e-learning provider in implementing e-learning security strategy. The results can also be a guide for the e-learning users to increase their awareness on the potential threats in e-learning environment.
KeywordsThreats analysis E-learning Application system Information security threats Matrix of threats’ risk
Unable to display preview. Download preview PDF.
- 1.Allen, E., Seaman, J.: Online Nation Five Years of Growth in Online Learning, vol. 1 (2007)Google Scholar
- 2.Barbeau, M.: WiMax/802.16 Threat Analysis, pp. 8–15 (2005)Google Scholar
- 4.Bruns, R., Dunkel, J., von Helden, J.: Secure Smart Card-Based Access to an e-Learning Portal. In: Proceedings of the 5th International Conference on Enterprise Information Systems (ICEIS), Angers, France (2003)Google Scholar
- 5.Conole, G., Smith, J., White, S.: A critique of the impact of policy and funding. In: Conole, G., Oliver, M. (eds.) Contemporary Perspectives in E-Learning Reserach Themes, Methods and Impact on Practice, pp. 38–54. Routledge, London (2007)Google Scholar
- 9.Jalal, A., Zeb, M.A., Peshawar, P.: Security Enhancement for e-Learning Portal. International Journal of Computer Science and Network Security 2, 236 (2008)Google Scholar
- 11.Lim, C.C., Jin, J.S.: A Study on Applying Software Security to Information Systems: E-Learning Portals. IJCSNS 6, 162 (2006)Google Scholar
- 12.Littman, M.K.: Guidelines for Network Security in the Learning Environment. Journal of Instruction Delivery Systems 10, 35–40 (1996)Google Scholar
- 13.Norman, S., Da Costa, M.: Overview of e-Learning Specifications and Standards. Open Learning Agency, and Eduspecs Technical Liaison Office (2003)Google Scholar
- 14.Patterson, D., Jung, G., Broadhead, G.: The UK e-Learning Market 2009, p. 17 (2009)Google Scholar
- 15.Raitman, R., Ngo, L., Augar, N.: Security in the Online E-Learning Environment. Advanced Learning Technologies. In: Fifth IEEE International Conference on Advanced Learning Technologies, ICALT 2005, pp. 702–706 (2005)Google Scholar
- 18.Saxena, R.: Security and Online Content Management: Balancing Access and Security. Breaking boundaries: integration and interoperability. In: 12th Biennial VALA Conference and Exhibition Victorian Association for Library Automation (2004)Google Scholar
- 20.Yang, C., Lin, F.O., Lin, H.: Policy-Based Privacy and Security Management for Collaborative E-Education Systems. In: Proceedings of the 5th IASTED International Multi-Conference Computers and Advanced Technology in Education (CATE 2002), pp. 501–505 (2002)Google Scholar