Abstract
This paper intends to shed light on the security problems faced by e-learning. It illustrates a case study on conducting security testing on e-leaning portals of Universiti Sains Islam Malaysia (USIM). Four of e-leaning portals were tested for common vulnerabilities using two of Web application scanner tools which are Acunetix and Netsparker. Moreover, a survey, based on ISO/IEC 27002:2005 was administered to USIM employees for assess the level of information security awareness amongst E-Learning Center employees. Using these two methods, a deeper understanding of the status of security level amongst USIM employees is presented from the standard security point of view and the need for a research to address and overcome the problem
…show more content…
These tools have some common features whether it is open source or commercial. These tools provide learning material; this material is divided into modules and lessons with various types of user’s rights based on the user’s role, i.e. learner, instructor, and manager. These users will also classify according to individual roles, year of study, enrolled lessons, and assigned …show more content…
RESEARCH METHODOLOGY
This study adopted quantitative method. The quantitative method is used to get the data and result from the scanner tools about the vulnerabilities and the questionnaire. Data collected is analyzed using descriptive statistics analysis. Achieving the research aim, this study was conducted in two stages:
The first stage is assessing the vulnerability of the website and their security weaknesses by using web application scanner tools. This stage focused to investigate the security levels of e-USIM website. It is important to note that selecting a vulnerability Assessment for web services is a very difficult task as different scanners detect different types of vulnerabilities (Ihmouda & Mohd Alwi, 2013) (Vieira, Antunes, & Madeira, 2009).
3.1 Vulnerability Assessment
Web application security testing are a collecting of many automated tools set together and used to identify security vulnerabilities in web applications, using these tools can save extensive time and money, and there are many free and commercially tools available. Security Vulnerability Scanners Software is a type of software that aims to discovery vulnerabilities of a web application from potential intruders. There are numerous of Security Vulnerability Testing software applications which are free or paid software editions. the current study used two different software packages, Netsparker and
4.1 Theft In the event of physical thefts of company equipment or other network property we have to secure vulnerabilities in company property access and perimeter physical barrier that protects all company assets. To prevent intruders from accessing company grounds without authorization we have many choices in physical controls such as surveillance cable/laptop locks, cameras, security guard, alarm system, access control scanners at entry points, mantraps. As a preventative measure from property break-ins, all lower level (easily accessed from outside) office windows must be protected by installing window bars and/or using fence that secures all company property limits. In addition, a mantrap interlocking door control would greatly increase security.
Access Issues 2. Mitigating risk 3. Messaging security 4. Corrupt Data 5.
41. Do we use automated tools to assess system/network vulnerabilities?
With widespread use of internet services, the network scale is expanding on daily basis and as the network scale increases so will the scale of security threats which can be applied to system connected to the network. Viruses and Intrusions are amongst most common threats that affects computer systems. Virus attacks can be controlled by proper antivirus installation and by keeping the antivirus up to date. Whereas any unauthorized access in the computer system by an intruder can be termed as Intrusion and controlled by IDS. Intruders can be grouped into two major categories which are external and internal Intruders.
In this modern world the need for designing and developing an application with good secure features is very high. I have also learned what an error exceptional handling is and why is it important in code review. I have also learned that in developing a software product or in the software development life cycle process, a software product must be teste in earlier stages and very frequently. This recalled my knowledge of secure software development life cycle. One must know the importance of secure software development life cycle.
1. Standards Driven Data: Online tools and resources will be used to analyze standards used in a course. How often are they being used and are they being used appropriately? Data then will determine what needs changed and adapted to meet those requirements. 2.
Case 1: San Francisco International Airport and Quantum Secures SAFE for Aviation System San Francisco International Airport is expecting a rise of passengers due to an increase of low-cost carriers. They require a new security management system to accommodate the amount of traffic expected. Their current process is inefficient and disjointed, leading to many problems. The upgrade required needs to be justified and approved by management to be funded. 1.
Implement a policy where employees must adjust their passwords every sixty days and that they must set a screen lock out when they step away from their workstation 4. True or false: COBIT P09 risk management control objectives focus on assessment and management of IT risk. True 5. What is the name of the organization that defined the COBIT P09 Risk Management Framework?
1:- Penetration Testing It is the process of trying to gain unauthorized access to authorized resources, systems and applications. Penetration testing is also known as an ethical hacking as “breaking into your own system to see how hard it is to do”. Network security measurement is the task which aims at supplying the scanning to check the security flaws and security threats in applications and networks. 2:- Why perform penetration testing • Test network or system using the tools and techniques that attackers use.
Describe different types of business documents that may be produced and the format to be followed for each. There are many different types of business documents that are used daily in business environments, for example; Emails- The fastest way to send documents and information and follow the format of recipient and subject. Spreadsheets- These are used to store information electronically.
Our attachment style is how we relate to ourselves, God, and others. There are four main attachment styles: avoidant, ambivalent, disorganized, and secure. The avoidant attachment style has a high view of self and a distrust for others. The opposite of that is the ambivalent attachment style: a poor view of self and a dependence on others. The disorganized attachment style does not trust themselves or others.
Stations or centers might be teacher-led if new knowledge is to be given or student-led if mastery is to be obtained on the information given by the teacher. Project-based is another strategy and one of the best ways to differentiate instruction due to the students’ needs and styles are addressed. Projects internalize help and support among students beside some academic skills. Tiered Activities, on the other hand, are based on the learning tasks designed at different levels of complexity according to students’ readiness levels, i.e. to be gradually given to the students ,whenever the student finishes one stage, they transfer to the other one until the task is done, or at times keeping the learning outcomes same the learning tasks can be designed according to students’ learning preferences viz. Learning styles or Gardner’s multiple intelligences.
Staying Safe Online - for Teenagers & Adult Please carefully consider and abide by the tips below and remember that they apply to public posts and private messages. The importance of staying safe online cannot be overestimated. Always keep in mind that there are lots of dangerous people online. Many of them are very good at pretending to be someone else and winning your trust. Please read the SMART Guidelines below, for useful tips on staying safe online.
Digital learning has various effects on the academic performance of the students and this digital learning can help the students to improve their performance in the classroom. Digital learning really makes the students work easier. Because of this, the students may have an advanced knowledge by easily searching their lesson using this technology. With this digital technology, it gives more information to the students to gain more knowledge about their school works. There are lots of technology that were integrated into the classroom that help the students learn with comfort, and that allows the student to gain and recall more information.
1) INTRODUCTION Education is an important thing for all people, especially to students who will grow up and will develop advanced countries. Education is not only to go to school but also education can be obtained everywhere now, for or example, at home. Parents can teach their children. By using the sophisticated technology now, education can also be easily found. Technology is a type of electrical system or digitally generated to facilitate everyone in manual.