Cybersecurity analysis in e-learning platforms: A systematic literature review
DOI:
https://doi.org/10.47187/perspectivas.5.1.179Keywords:
Attacks, Cybersecurity, E-Learning Platforms, Attacks, CybersecuritSystematic Literature Review, Vulnerabilities.Abstract
Cybersecurity analysis of e-learning platforms is critical because they store and transmit sensitive and confidential information, such as personal data of students and teachers, grades and test results, and academic documents. In addition, e-learning platforms are often used to conduct online learning activities, which can increase the risk of disruptions and technical problems if not properly managed. The paper aims to perform a systematic literature review of cybersecurity issues in Moodle, Blackboard, and Microsoft Teams e-learning platforms using the protocol defined by Kitchenham from 2016 to 2022. The results detail some measures, including data encryption, more robust user authentication, software upgrades, and security policies that mitigate threats in these learning environments.
Métricas
References
R. H. Rodríguez and V. A. Vaca, "Importancia de las herramientas y entornos de aprendizaje dentro de la plataforma e-learning en las universidades del Ecuador," Edutec. Revista Electrónica de Tecnología Educativa. no. 65, pp. 68-92 (396), 2018.
M. Andrés, L. Díaz, P. Guía, David, and A. R. Zúñiga, “Universidad Nacional Andrés bello Facultad de Ingeniería. redicción de áreas con usuarios vulnerables a ciberataques.”
P. I. Morales-Paredes and R. P. M. Chicaiza, "Ciberseguridad en plataformas educativas institucionales de educación superior de la provincia de Tungurahua-Ecuador," TIC: cuadernos de desarrollo aplicados a las TIC, vol. 10, no. 2, pp. 49-75, 2021.
G. Bustamante Maldonado, J. Andrés, and O. Cano, “Methodology of Information Security as a Measure of Protection Small Business,” 2014.
G. Tebes, D. Peppino, P. Becker, and L. Olsina, "Especificación del Modelo de Proceso para una Revisión Sistemática de Literatura," CIbSE.
M. M. Olmedo and V. J. Chaves, "Seguridad de la información en plataformas e-learning en tiempos de pandemia COVID-19," Revista UNIDA Científica.
C. A. Santamaría Calucho, "Control de Seguridad en una Plataforma Educativa Institucional," Pontificia Universidad Católica del Ecuador, 2022.
latam.kaspersky.com, “Casos de éxito Kaspersky,” CompanyAccount, 2022.
P. Lluzar Martí, "Ciberseguridad y E-learning: Hacia una transferencia tecnológica sostenible entre España y el Perú ,2019.
A. S. Flórez, J. G. Chacón, R. A. Chía, A. E. Flórez, and J. E. J. I. e. I. Rodriguez, "Política De Seguridad Hsts O Seguridad De Transporte Http Estricta Y Su Implementacion En Entornos Web," 2021.
“Seguridad y Microsoft Teams,” learn. microsoft.com, Dec. 12, 2022.
R. Rodriguez, “Interoperabilidad MatefunMoodle,” 2021.
A. C. Alvarado Tapia and R. A. Montesdeoca
Cabrera, "Análisis de vulnerabilidades del servidor e-learning de la ESPOCH para la implementación de mejores prácticas de seguridad-acceso," Escuela Superior Politécnica de Chimborazo, 2017.
L. M. Romero-Moreno, “La seguridad informática en el trabajo con la plataforma Moodle,” 2018.
R. S. Yesquen Rodriguez, "Prototipo de Detección y Mitigación de Ataques de Denegación de Servicios (DoS), en
Servidores Web," 2018.
INCIBE, “Medidas de prevención contra ataques de denegación de servicio,” Instituto Nacional de Ciberseguridad, Jul. 09, 2019.
M. P. Echeverria Broncano and D. F. Ávila Pesantez, “Ciberseguridad en los sistemas de gestiónde aprendizaje (LMS),” Ecuadorian Science Journal, vol. 5, no. 1, pp. 46–54, Mar. 2021, doi: 10.46480/esj.5.1.98.
“Vega Vulnerability Scanner Application in Web Applications.” [Online]. Available: http://www.trabajo.gob.ec/
N. Segundo and C. Jimenez, “HACKING WEB (ANÁLISIS DE ATAQUES SQL Inyección, XSS),” 2019.
W. Ajayi, O. E. Ibeto, O. Ibeto, T. Olomola, and M. Madewa, “Analysis of modern cybersecurity threat techniques and available mitigating methods analysis of modern cybersecurity threat techniques and available mitigating methods,” International Journal of Advanced Research in Computer Science, vol. 13, no. 2, doi: 10.26483/ijarcs. v13i2.6815.
F. D. Salimovna and Y. N. Salimovna, "Security issues in E-Learning system," in 2019 International Conference on
Information Science and Communications Technologies (ICISCT), 2019, pp. 1-4: IEEE.
Fabian Coelho, “Definiciones En: Signifiados.com. ,” significados.com/metodologia, 2018.
Metodologíassdee E-learning. [Online]. Available: www.fao.org/publications
El “Copyright y Licencia Tabla de Contenidos Sobre OWASP,” 2003. [Online]. Available: https://github.com/OWASP/Top10/issues
J. Vinicio, B. Guerrero, I. David, and O. Guevara Aulestia, “Análisis de seguridad de la información aplicando la metodología NIST SP 800-30 y NIST SP 800-115 para la empresa textiles jhonatex línea de investigación: Normas y Estándares.”
“00004875”.
E. Ortiz and M. M. Toro-Alvarez, “IRETE resultado preliminar del estudio comparativo de metodologías de pruebas de intrusión informática,” 2018, doi: 10.13140/RG.2.2.19947.18728
“RISK ANALYSIS IN SECURITY OF INFORMATION.”
E. coordinación de contenidos, D. General de Modernización Administrativa, and P. Impulsode la Administración Electrónica, “Magerit versión 3.0: Metodología de análisis y gestión de riesgos de los Sistemas de Información. Libro I: Método.” [Online]. Available: http://administracionelectronica. gob.es/
H. Santiso, J. Matías Koller, and M. G. Bisaro, “Seguridad en Entornos de Educación Virtual Security in Virtual Education Environments,” Memoria Investigaciones en Ingeniería, núm, vol. 14, 2016.
P. I. Morales-Paredes and P. MedinaChicaiza, “Ciberseguridad en plataformas educativas institucionales de educación superior de la provincia de Tungurahua - Ecuador,” 3C TIC: Cuadernos de desarrollo aplicados a las TIC, vol. 10, no. 2, pp. 49–75, Jun. 2021, doi: 10.17993/3ctic.2021.102.49-75.
Seguridad de la información, “Estudio comparado de metodologías de análisis de riesgos para TI y Seguridad de la Información”, vol. 01, 2021.
P. Sharma, K. Agarwal, and P. J. I. J. Chaudhary, "E-Learning Platform Security Issues and Their Prevention Techniques: a Review," vol. 6, no. 8, 2021.
F. Andres and M. Becerra, “Análisis de las vulnerabilidades asociadas a la plataforma de e-learning moodle”.
Metodología de Ciberdefensa para Organizaciones Versión 1.0: Mejores Prácticas en Ciberseguridad
A. Scerbakov, F. Kappe, and N. Scerbakov, “Security vulnerabilities in modern LMS,” in Multi Conference on Computer Science and Information Systems, MCCSIS 2019 - Proceedings of the International Conference on e-Learning 2019, 2019, pp. 282–286. doi: 10.33965/el2019_201909c038.
M. Rabie, “Cybersecurity vulnerability assessment in learning cyber security vulnerability assessment in learning management systems management systems,” 2021. [Online]. Available: https://scholarworks.lib.csusb.edu/etd/1376
A. E. M. Elsawy and O. S. Ahmed^, “International Journal of Current Engineering and Technology E-Learning
using the Blackboard system in Light of the Quality of Education and Cyber security,” 49| International Journal of Current Engineering and Technology, vol. 9, no. 1, doi: 10.14741/ijcet/v.9.1.7.
H. Ibrahim, S. Karabatak, and A. A. Abdullahi, “A Study on Cybersecurity Challenges in E-learning and Database Management System,” in 8th International Symposium on Digital Forensics and Security, ISDFS 2020, Jun. 2020. doi:10.1109/ISDFS49300.2020.9116415.
R. Ali, H. Zafar, A. Security, and R. Ali Humayun Zafar, “A Security and Privacy Framework for e-Learning Recommended Citation A Security and Privacy Framework for e-Learning.” [Online]. Available: https://digitalcommons.kennesaw.edu/facpubs/4137
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Paola Alexandra Pillajo Garcia, Diego Ávila Pesantez
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright
The authors of the manuscripts will retain their copyright on their articles published in Pespectivas Journal. These rights allow the authors to present their manuscripts in public, prepare derivative works, reproduce them physically by printing and distribute them on their social or research networks. These rights will remain unchanged as long as the authors respect the publication and free access policy of Perspectivas Journal.
Publication Rights
Perspectivas Journal reserves all first publication rights on each of the articles that the authors have sent to its review and publication process. It implies that authors will only exercise their copyright if they state the source and origin of the publication correctly, mainly when they distribute, share, present, or use their articles' total or partial content.