2020 8th International Symposium on Digital Forensics and Security (ISDFS) 2020
DOI: 10.1109/isdfs49300.2020.9116415
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Cybersecurity Challenges in E-learning and Database Management System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 7 publications
0
6
0
2
Order By: Relevance
“…The authors discussed certain key security measures, such as using a trustworthy and fast Internet connection to conduct financial transactions, using secure communication to maintain consumer confidence, and enabling ICT monitoring. The author also mentioned the need for technical assistance, as well as the need for privacy policies in protecting personal information [39]. Abomhara and Kien [40] evaluated IoT device security and the sorts of risks that exist in the IoT context.…”
Section: Cybersecurity Policiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors discussed certain key security measures, such as using a trustworthy and fast Internet connection to conduct financial transactions, using secure communication to maintain consumer confidence, and enabling ICT monitoring. The author also mentioned the need for technical assistance, as well as the need for privacy policies in protecting personal information [39]. Abomhara and Kien [40] evaluated IoT device security and the sorts of risks that exist in the IoT context.…”
Section: Cybersecurity Policiesmentioning
confidence: 99%
“…In addition, access control regulations in universities prevent illegal access to data in institutions other than by students, professors, and staff. Bandara et al [22] stressed the importance of putting in place information security policies at universities to protect resources, in addition to personal, sensitive student data, and to protect private learner data, financial and bank-related course fees and payments, and any other potentially sensitive data against attack or abuse [39]. To avoid data tampering and maintain the integrity of data, Kalpana and Singaraju [48] recommended utilizing RSA algorithms, secure methods to assure privacy and confidentiality for permitted access, and secure virtual memory and storage in Cloud service providers.…”
Section: Cybersecurity Policiesmentioning
confidence: 99%
“…La Figura 2 muestra el histograma de aportes científicos entre 2014 y 2020 en relación con las vulnerabilidades y ataques más comunes en los principales LMS. Uno de los trabajos más significados propuesto por (Ibrahim et al, 2020), quienes especifican varias estrategias para disminuir ataques a las bases de datos de los LMS, entre las que se encuentran los privilegios de la base de datos y controles de acceso, licencia de la base de datos, la seguridad de los datos utilizando el sistema almacenado, encriptación de datos, auditorías de seguimiento y control de acceso a la base de datos y copia de seguridad de los datos. Figura 2.…”
Section: B Realización De La Revisiónunclassified
“…-Modelos de Infraestructura Clave (PKI) Según los autores Ibrahim et al (2020) sugirieron la implementación de un sistema basado en el sistema de Modelos de Infraestructura Clave (PKI) que ofrecen seguridad esencial propiedades y servicios en el aprendizaje colaborativo en línea, que asegura la disponibilidad, integridad, autenticidad y confidencialidad de los datos y la información. La PKI consiste en hardware, software y procedimientos necesario para gestionar, almacenar y revocar los certificados digitales y claves públicas -Modelo creado por Microsoft Para los autores Mohd Alwi & Fan (2010) propusieron un modelo que fue creado por Microsoft en el diseño de la web para evaluar las amenazas a la seguridad en los sistemas de aprendizaje electrónico conocido como "IWAS".…”
Section: Unsafe-urlunclassified
“…Moreover, data management also gets quite easier and more efficient as well after the rapid implementation of IoT technology. These kinds of wide diversified facilities effectively help the spread the usage of the IoT technology in the market faster [1].…”
Section: ░ 1 Introduction 11 Backgroundmentioning
confidence: 99%