SECURITY VULNERABILITIES IN CLOUD-BASED E-LEARNING Cover Image

SECURITY VULNERABILITIES IN CLOUD-BASED E-LEARNING
SECURITY VULNERABILITIES IN CLOUD-BASED E-LEARNING

Author(s): Livia Maria BRUMĂ
Subject(s): Security and defense, ICT Information and Communications Technologies, Distance learning / e-learning
Published by: Carol I National Defence University Publishing House
Keywords: cloud computing; cloud security; cloud vulnerabilities; E-Learning; security policy;

Summary/Abstract: In recent years, the use of the Internet together with the technologies that make possible the process of task automation has been adopted in all sectors of activity, in production, administration and education. Thus, the information revolution has also generated changes in the way of carrying out the daily activities of the contemporary society, characterized by dynamism and dependence on information, so that it was necessary to develop new technologies that would meet the demands of modern people. Cloud technology offers many benefits to users, fast and simplified deployment methods, reduced costs, continuous availability of resources, scalability and elasticity, and it can be easily adapted to the needs of organizations. The use of cloud computing technology in e-learning domain represents an ongoing process, through which the teaching and learning methods adapt to the current technology-based society. Both students and teachers can benefit by the features offered by this type of architecture, using the electronic environment in a dynamic and interactive process of learning, teaching and evaluation. The migration of the services used in the educational framework in the cloud involve certain challenges from the point of view of data and information security. One of the most important challenges for cloud service providers is the need to ensure data security, mainly ensuring confidentiality, integrity and availability. Increasingly frequent cyber-attacks can cause significant material damage if no specific security measures are configured. Most attacks occur by exploiting security breaches caused by technology vulnerabilities and misconfigured network equipment. This article analyzes the main vulnerabilities of cloud technology, compared to current security methods, which can cause critical security issues, such as data breach. Also, an additional security policy applicable to both public and private cloud architectures, specific to the educational environment, is proposed to offer additional protection against threats.

  • Issue Year: 16/2020
  • Issue No: 01
  • Page Range: 190-197
  • Page Count: 8
  • Language: English
Toggle Accessibility Mode