Enhancing Security and Sustainability of e-Learning Software Systems: A Comprehensive Vulnerability Analysis and Recommendations for Stakeholders

被引:4
|
作者
Akacha, Souheil Abdel-Latif [1 ]
Awad, Ali Ismail [1 ,2 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, POB 15551, Al Ain, U Arab Emirates
[2] Al Azhar Univ, Fac Engn, POB 83513, Qena, Egypt
关键词
e-learning software systems; cybersecurity vulnerabilities; COVID-19; pandemic; cyberattacks; mitigation strategies; sustainability of e-learning systems; resilience of e-learning systems;
D O I
10.3390/su151914132
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The onset of the COVID-19 pandemic prompted educational institutions to swiftly integrate e-learning software systems, including learning management systems (LMSs), as essential tools for online education. This study aims to probe the inherent security vulnerabilities of three widely utilized e-learning platforms, namely, Moodle, Chamilo, and Ilias, spanning the pre-pandemic, pandemic, and post-pandemic periods. The rapid adoption of these platforms during the pandemic revolutionized online education but also unveiled security risks. This paper delves into these security vulnerabilities, offering insights before, during, and after the pandemic. Through an analysis of existing patches and security measures, areas for improvement are identified. Furthermore, the paper considers emerging cybersecurity technologies and trends, providing comprehensive recommendations to enhance system resilience against evolving cyber threats. The results obtained here can provide educational institutions with a guide for action to enable effective mitigation of e-learning software security vulnerabilities and ensure the continued security and sustainability of online education systems.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Fuzzy Evaluation Model for Enhancing E-Learning Systems
    Lee, Tai-Shan
    Wang, Ching-Hsin
    Yu, Chun-Min
    MATHEMATICS, 2019, 7 (10)
  • [22] Enhancing the Privacy of e-Learning Systems with Alias and Anonymity
    Yong, Jianming
    COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN IV, 2008, 5236 : 534 - 544
  • [23] A framework for evaluating the information security of e-learning systems
    Eibl, Christian J.
    von Solms, Basic S. H.
    Schubert, Sigrid
    INFORMATION TECHNOLOGIES AT SCHOOL, 2006, : 83 - 94
  • [24] MATHEMATICAL SOFTWARE FOR E-LEARNING SYSTEMS IN MECHANICAL ENGINEERING
    Nemtinov, Vladimir
    Krasnyanskiy, Mikhail
    Borisenko, Andrey
    Nemtinova, Yulia
    Karpushkin, Sergey
    INFORMATICS, GEOINFORMATICS AND REMOTE SENSING, VOL I (SGEM 2015), 2015, : 191 - 198
  • [25] Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems
    Alqahtani, Hamed
    Kumar, Gulshan
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 129
  • [26] Relationship Modeling of Critical Success Factors for Enhancing Sustainability and Performance in E-Learning
    Ahmad, Naim
    Quadri, Noorulhasan Naveed
    Qureshi, Mohamed Rafik N.
    Alam, Mohammad Mahtab
    SUSTAINABILITY, 2018, 10 (12)
  • [27] Who is responsible for e-learning success in higher education? A Stakeholders' analysis
    Wagner, Nicole
    Hassanein, Khaled
    Head, Milena
    EDUCATIONAL TECHNOLOGY & SOCIETY, 2008, 11 (03): : 26 - 36
  • [28] ASSESSING ETHICAL SEVERITY OF e-LEARNING SYSTEMS SECURITY ATTACKS
    Levy, Yair
    Ramim, Michelle M.
    Hackney, Raymond A.
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2013, 53 (03) : 75 - 84
  • [29] ESaaS: A New Education Software Model in E-learning Systems
    Masud, Md Anwar Hossain
    Huang, Xiaodi
    INFORMATION AND MANAGEMENT ENGINEERING, PT V, 2011, 235 : 468 - 475
  • [30] SOLUTIONS FOR DEVELOPING AND INTEGRATING SOFTWARE TOOLS FOR E-LEARNING SYSTEMS
    Moraru, Sorin Aurel
    Ungureanu, Delia
    Sandu, Florin
    Grigorescu, Costin
    Krupka, Lothar
    ANNALS OF DAAAM FOR 2008 & PROCEEDINGS OF THE 19TH INTERNATIONAL DAAAM SYMPOSIUM: INTELLIGENT MANUFACTURING & AUTOMATION: FOCUS ON NEXT GENERATION OF INTELLIGENT SYSTEMS AND SOLUTIONS, 2008, : 905 - 906