CYBERSECURITY ASPECTS OF E-LEARNING PLATFORMS
Abstract
Keywords
Full Text:
PDF (Українська)References
Sejzi, A. A., Arisa, B. Learning Management System (LMS) and Learning Content Management System (LCMS) at Virtual University. Proc. 2nd International Seminar on Quality and Affordable Education, 2018, pp. 216-220.
Iftakhar, S. Google classroom: what works and how. Journal of Education and Social Sciences, 2016, vol. 3, no. 1, pp. 12-18.
Digital Education: The cyberrisks of the online classroom. Available at: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/09/04113558/education_report_04092020_2.pdf (accessed 11.10.2020).
Barhoom, T. S., Azaiza, R. J. Enhance MOODLE security against XSS vulnerabilities. International Journal of Computing and Digital Systems, 2016, vol. 5, no. 5, pp. 421-430.
Craigen, D. Diakun-Thibault, N., Purse, R. Defining cybersecurity. Technology Innovation Management Review, 2014, vol. 4, no. 10. Available at: https://timreview.ca/article/835 (accessed 11.10.2020).
Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P. Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall, 2004. 400 p.
Hofstede, R., Jonker, M., Sperotto, A., Pras, A. Flow-based web application brute-force attack and compromise detection. Journal of network and systems management, 2017, vol. 25, no. 4, pp. 735-758.
Tetskiy, A. G. Primenenie derev'ev atak dlya otsenivaniya veroyatnosti uspeshnnoi ataki web-prilozheniya [Applying of attack trees for estimation the probability of a successful attack of the web-application]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2018, no. 3 (87), pp. 74-79. DOI: 10.32620/reks.2018.3.08.
Learning Management System Usage Distribution on the Entire Internet. Available at: https://trends.builtwith.com/cms/learning-management-system/traffic/Entire-Internet (accessed 11.10.2020).
Klassifikatsiya kritichnosti informatsionnyh sistem [Criticality classification of information systems]. Available at: https://habr.com/ru/post/512556/ (accessed 11.10.2020).
Web Application Security Assessment. Available at: https://www.whitehatsec.com/glossary/content/web-application-security-assessment (accessed 11.10.2020).
National Vulnerability Database. Available at: https://nvd.nist.gov/ (accessed 11.10.2020).
DOI: https://doi.org/10.32620/reks.2020.4.08
Refbacks
- There are currently no refbacks.