Education or Threat? Common Security Risks in E-Learning Systems

Hanieh Zehtab Hashemi , Noushin Kohan, Parvane Parvasideh * ℗

Education or Threat? Common Security Risks in E-Learning Systems

Code: G-1979

Authors: Hanieh Zehtab Hashemi , Noushin Kohan, Parvane Parvasideh * ℗

Schedule: Not Scheduled!

Tag: Intelligent Virtual Assistant

Download: Download Poster

Abstract:

Abstract

Introduction and objective: With the rapid expansion of e-learning, particularly among digital natives, ensuring the security of educational platforms has become increasingly critical. Despite its popularity, e-learning environments face numerous security threats that compromise the confidentiality, integrity, and availability of educational data. This study aims to identify and analyze the most common security threats to sensitive assets in e-learning systems. Methods: This review was conducted by searching for relevant literature using the keywords eLearning, Online Learning, and Security in Google Scholar and Scopus databases, covering the period from November 2023 to October 2024. A total of 38 articles were selected for analysis. Articles were chosen based on their relevance to e-learning security, their publication date, and availability in English. Priority was given to studies that focused on technical security threats and preventive strategies in educational environments. Results: The reviewed studies highlight user-side, network-side, and server-side vulnerabilities. Common security threats include malware, ransomware, phishing, DoS/DDoS attacks, and SQL injection. These threats can significantly disrupt learning continuity and compromise data integrity. Conclusion: To mitigate these risks, it is essential for educational institutions to implement comprehensive security policies, standards, and procedures. Additionally, the integration of robust authentication, access control, and encryption mechanisms can enhance platform security, user trust, and overall learning effectiveness.

Keywords

E-learning, Distance Learning, Information Security, Cybersecurity

Feedback

What is your opinion? Click on the stars you want.

Comments (0)

No Comment yet. Be the first!

Post a comment