Cyber Security Concerns in E-learning Education

نویسندگان

  • I.Bandara
  • F.Ioras
  • K. Maher
چکیده

Cyberspace refers to the boundless space known as the Internet. Cyber security is the body of rules put in place for the protection of this cyberspace. The increasing use of e-Learning systems has been documented by numerous studies and shows continuing growth; little attention has been given to the issue of security of e-Learning systems both in research and education. In this paper, we illustrate an approach to understanding, evaluating, monitoring, measuring and managing cyber security as it relates to e-Learning systems. Security of e-Learning systems represents a unique challenge as numerous systems are accessed and managed via the Internet by thousands of users over hundreds of networks. Moreover, this paper reveals the prevalence of internal cyber-attack as well as a lack of proper IT policies and procedures in e-Learning systems, in light of their standard architecture and their specific security requirements. Also, we discuss the most important security challenges that can be relevant for distributed e-Learning systems. Because e-Learning systems are open, distributed and interconnected, then security becomes an important challenge in order to ensure that interested, and authorised, actors only have access to the right information at the appropriate time.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maximizing Security Management Performance and Decisions with the MFC Cyber Security Model: e- learning case study

The Mean failure Cost (MFC) is a cascade of linear models that quantify security threats by taking into consideration the system’s stakeholders, security requirements, architectural components and threats. This quantitative cyber security model monetizes system’s security in terms of cost which may be lost due to security failure. The lack of quantitative security models in security decision ma...

متن کامل

Cyber Medical Education: Beyond the Integration of Concepts in Technology-based Learning

Introduction: Along with the transition from the digital era to the era of cyber-technology, medical professionals have been forced to use different conceptual systems to meet their informational and communicational needs. These emerging scientific concepts each have specific meaning which should be redefined in their own context so that they could be utilized in the conceptual systems of speci...

متن کامل

A Framework for Cyber Security in Africa

This paper deals with at least four major cyber safety concerns in Africa discussed in recent literature. These cyber concerns include aspects such as policies, procedure, awareness, research and the provision of technical security measures. Each concern is examined, the main focus areas are highlighted and a solution is proposed. This paper concludes by combining all relevant solutions into a ...

متن کامل

Guide for Designing Cyber Security Exercises

Cyber security exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task and requires the work of several people. This paper presents a number of steps and guidelines that should be followed when designing a new cyber security exercise. The steps include: defining the objectives, choosing an approach, designing...

متن کامل

Instructional Perspective: Towards an Integrative Learning Approach in Cybersecurity

This paper describes a multifaceted approach to cybersecurity education based on integrative learning theory. We emphasize the need to focus on curriculum, experiential learning techniques, assessment and fostering a community of practice. The need to build conceptual, tactical and practical skills among cybersecurity professionals is highlighted. The paper will include examples of how integrat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014