E-Learning Software Security Tested for Security Vulnerabilities & Issues

被引:4
|
作者
Violettas, George E. [1 ]
Theodorou, Tryfon L. [1 ]
Stephanides, George C. [2 ]
机构
[1] Tech Trainers Coll, ICT Dept, Riyadh, Saudi Arabia
[2] Univ Macedonia UoM, Dept Appl Informat, Thessaloniki, Greece
关键词
electronic learning; information security; web design;
D O I
10.1109/ECONF.2013.66
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper intends to shed light on the security problems faced by e-learning software; which, until now has not been systematically tested for vulnerabilities and weaknesses. These result to web programs exposed to attacks that are fairly easy to implement. Additionally, e-learning software deals with intelligent, studious individuals; The intended audience for the product has the knowledge, or is potentially being taught the knowledge, to compromise the software. The problem is that in a situation like this, the compromised software remains unrevealed, probably for ever, because the beneficiaries have absolutely no need to reveal their findings, but rather exploit the very best of it.
引用
收藏
页码:233 / 240
页数:8
相关论文
共 50 条
  • [31] CYBER SECURITY CONCERNS IN E-LEARNING EDUCATION
    Bandara, I.
    Ioras, F.
    Maher, K.
    [J]. ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2014, : 728 - 734
  • [32] Security issues and vulnerabilities of the SNMP protocol
    Chatzimisios, P
    [J]. 2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 74 - 77
  • [33] Security challenges of distributed e-learning systems
    Cárdenas, RG
    Sánchez, EM
    [J]. ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 538 - 544
  • [34] E-LEARNING AS TOOL OF SECURITY MANAGEMENT PREPARATION
    Lunacek, Oldrich
    [J]. DISTANCE LEARNING, SIMULATION AND COMMUNICATION 'DLSC 2015', 2015, : 86 - 91
  • [35] INTEGRATING INFORMATION SECURITY IN AN E-LEARNING ENVIRONMENT
    Vasilescu, Cezar
    Tatar, Livia
    Codreanu, Aura
    [J]. ANYWHERE, ANYTIME - EDUCATION ON DEMAND, VOL II, 2011, : 70 - 75
  • [36] Information Security Threats Analysis for E-Learning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    [J]. TECHNOLOGY ENHANCED LEARNING: QUALITY OF TEACHING AND EDUCATIONAL REFORM, 2010, 73 : 285 - 291
  • [37] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    [J]. IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [38] Portable devices of security and privacy preservation for e-learning
    Yong, Jianming
    Li, Jiuyong
    Wang, Hua
    [J]. PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 1029 - +
  • [39] A framework for evaluating the information security of e-learning systems
    Eibl, Christian J.
    von Solms, Basic S. H.
    Schubert, Sigrid
    [J]. INFORMATION TECHNOLOGIES AT SCHOOL, 2006, : 83 - 94
  • [40] Implementation of e-learning into the process security education in universities
    Kovacova, Lucia
    Vackova, Martina
    [J]. 4TH WORLD CONFERENCE ON EDUCATIONAL TECHNOLOGY RESEARCHES (WCETR-2014), 2015, 182 : 414 - 419