scholarly journals Cyber Security Featuresfor National E-Learning Policy

Author(s):  
Alya Geogiana Buja

This paper proposes cybersecurity features in the National e-Learning policy. Cybersecurity in the learning environment is becoming an issue that has been considered by the community.  DePAN 1.0 and DePAN 2.0 policies have not been carefully planned in any related security concerns. Amongst security domains in e-learning are authentication and accountability, access control, and non-repudiation issues. However, as the functionality of e-learning is expanding, information must be actively protected in this bigger context to avoid the loss of its confidentiality, integrity, and availability. Therefore, the existing policy and guidelines on e-learning have been studied thoroughly.  A very feasible study has been conducted on the existing literature and related works to e-learning and e-learning.  The security threats are also reviewed in this paper.  Based on the established e-Learning policy, therefore, the proposed security features are namely (CSF1) authentication and accountability, (CSF2) access control, (CSF3) protection of communication, and (CSF4) non-repudiation issues.  The findings from this study can be added to the implementation of e-learning in the future.

2018 ◽  
Vol 6 (2) ◽  
pp. 49-60 ◽  
Author(s):  
Brandon Valeriano ◽  
Ryan C. Maness

Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field.


Author(s):  
Neila Rjaibi ◽  
Latifa Ben Arfa Rabai ◽  
Ali Mili

This chapter presents an overview of security challenges in e-Learning systems, and discusses a recent review related research on security risk management approaches in e-Learning to give a proper context to our work. The literature review proves a lack in quantitative security risk management models applied to e-learning system and presents the strengths of the Mean Failure Cost model in quantifying security threats with a financial risk measure. Moreover, we focus on presenting security aspects of e-Learning applications, and analyze its respective stakeholders, security requirements, architectural components and threats. The Mean Failure Cost (MFC) cyber security measure suitable for e-Learning systems is defined and computed. We adapt it to quantify security threats and risk within e-learning systems. It is based on the identification of system's architecture, the well-defined classes of stakeholders, the list of possible threats and vulnerabilities and the specific security requirements related to e-Learning systems and applications.


Author(s):  
Smt. Ch. Vimala ◽  
Smt. P. Vishalini

Cyber security plays an important role in Information Technology. Securing the information becomes a challenge in present days. The main purpose of cyber security is to protect all organizational assets from threats as well as disruptions caused due to natural disasters. Various governments and companies are taking necessary measurements in order to prevent cybercrimes. Cyber security deals with the “Securing the future- securing the tomorrow’s world”.


Author(s):  
E. Kritzinger ◽  
S.H von Solms

This chapter introduces information security within the educational environments that utilize electronic resources. The education environment experienced a paradigm shift over the last several years, due to the rapid growth in technology. This growth has made it possible for the education environment to utilize electronic services to enhance education methods. It is however vital that all education environments (traditional or new ones) ensure that all resources (lecturers, students and data) are properly protected against any possible security threats. This chapter highlights the importance of securing information within the electronic environment. This is done by providing key aspects that must be addressed and implemented to ensure information security. The chapter also identifies four information security pillars that could assist top management to enhance overall information security management.


2014 ◽  
Vol 12 (1) ◽  
pp. 235-242
Author(s):  
Johannes Arnoldus Wiid ◽  
Michael Colin Cant

The use of technology in our everyday lives has become a very common occurrence and it is integrated in all facets of our lives. This is even more apparent in the field of academia where the leaders of the future are very astute users of technology. Technology, with its fast pace of change, has led to numerous new methods of communication between the students themselves and between the students and their lecturers. Communication is not the same anymore. Educational institutions worldwide have been forced to make better use of technology in order to better interact with students and to improve on the level of education that they provide. Open and Distance Leaning (ODL) Institutions, by their very nature, need to ensure they stay on the forefront of developments in this field in order to provide a better learning environment and service to its students. This article aims to determine the level of acceptance of e-learning systems and technology in ODL institutions by faculty, as well as their inclination to support it.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Sign in / Sign up

Export Citation Format

Share Document