SECURITY OF THE SYSTEM FOR ELECTRONIC LEARNING

Authors

  • Igor Ristić Faculty of Management, Sremski Karlovci, University UNION Nikola Tesla, Belgrade
  • Aleksandar Radonić Faculty of Management, Sremski Karlovci, University UNION Nikola Tesla, Belgrade

DOI:

https://doi.org/10.58898/sij.v1i1.09-13

Keywords:

e-learning, education, security, attacks

Abstract

Security is one of great problems in the creation and implementation of e-learning solution. As an end user is not able to see these problems, they are often neglected. As all other applications, e-learning portals are widely distributed and available to a wide audience, which makes them vulnerable in a way. As the concept of Web applications is very spontaneously developed without a detailed plan, and with great effort invested in development of programming languages and interpreters for Web applications, there is a danger from manipulation by malicious users.

Downloads

Download data is not yet available.

References

Anley, C.: Advanced SQL Injection In SQL Server Applications. Tech. rep., NGSSoftware Insight Security Research (NISR), 2021.

Borcea, K.; Donker, H.; Franz, E.; Ptzmann, A.; Wahrig, H.: Towards Privacy-Aware eLearning, PET 2005, Springer, 2006, no. 3856 in LNCS, pp. 167-178.

Jeremiah Grossman & Lex Arquette, Defcon 9 Web Aplication Security ”In theory & practice”, www.whitehatsec.com

Kajava, J.: Security in e-Learning: the Whys and Wherefores. In: European IntensiveProgramme on Information and Communication Technologies Security (IPICS’2003),4th Winter School, 2003

Learning Circuits [Online], “Field Guide to Learning Management Systems”, 2021, Retrieved November 25 2022, URL: http://www.learningcircuits.org/

OWASP Top Ten Project [Online Report], Open Web Application Security Project - the open application security community, 2021, Retrieved November 25 2022, URL: https://owasp.org/Top10/

Downloads

Published

2022-12-29

How to Cite

SECURITY OF THE SYSTEM FOR ELECTRONIC LEARNING . (2022). Social Informatics Journal, 1(1), 9-13. https://doi.org/10.58898/sij.v1i1.09-13

Similar Articles

1-10 of 12

You may also start an advanced similarity search for this article.