THE FUTURE FOR CYBER SECURITY

A study entitled, State of Cyber Security 2017, performed by ISACA (Information Systems Audit and Control Association), suggested that cyber security staff are becoming increasingly difficult to find in such a rapidly expanding and evolving field. The report was based on a survey of 633 cyber security specialists across North America and Europe, with 27% stating that they were unable to fill open cyber security positions in their businesses and another 14% unsure as to whether they would ever fill those positions...

Cloud Computing Based E-learning System

Cloud Computing Based E-learning SystemDigital Education

Cloud computing is a new model for managing and delivering services over the internet. It consists of a series of hardware and software resources made available on the Internet. Users can access, process, share, and store information through the Internet anytime and anywhere from any digital device. Cloud computing is flexible, highly scalable and creates virtualized resources that users can access all these resources without any specialized knowledge about the concept of cloud computing.

Cloud computing has a significant impact on teaching and learning environment. It is highly practical in education for both students and teachers. The cloud based environment supports the creation of new generation of e-learning systems. “E-learning (web-based learning system) is an Internet-based learning process using internet technology to design, implement, select, manage, support, and extend learning, which will not replace traditional education method, but will greatly improve the efficiency of education.” In fact, using web-based learning system has revolutionized educational organizations and has affected teaching and learning contexts in universities and educational institutions all over the world. In traditional web-based learning model, educational institutions invest a huge amount of money on hardware and software applications, infrastructure, maintenance and the appropriate training of staff to enable them to use technology effectively. However, in cloud based e-learning model, educational institutions without any infrastructure investments can get powerful software with lower or no up-front costs and fewer management headaches in the classroom. The development of e-Learning services within the cloud computing environment enables users to access diverse software applications, share data, collaborate more easily, and keep their data safely in the infrastructure. Moreover, it can lower expenses, reduce energy consumption, and help organizations with limited IT resources to deploy and maintain needed software in a timely manner.

Nowadays, some educational institutions provide private cloud services for their staff and students as well as external people for collaboration purposes. They can access various applications, services, and tools wherever and whenever they want. Students and teachers can conduct formal lessons even without a standard indoor classroom because cloud services allow them to share their information with anyone, anywhere, and at any time. Hence, learner-staff and learner-learner interactions as well as the learning experiences of both learners and staff will be enhanced. Therefore, cloud based-learning can be an efficient and effective system to help students obtain the 21st century skills and prepare them to succeed in the global information society.

Shifting e-learning in the cloud creates new security challenges. Main security concerns are about confidentiality, integrity and availability. Microsoft has provided instructions for IT managers to enhance the security in cloud based e-learning.

They are as follows:

  • Integration: Security and identity management technologies such as active directory, controls for role-based access and entity-level applications can be used to check integration points.
  • Privacy: data encryption, effective data anonymization and mobile location privacy are techniques for enhancing the security of cloud based e-learning.
  • Access: Educational institutions should be aware of a variety of methods to protect education records from improper access.
  • Jurisdiction: “ A cloud provider’s terms of service, privacy policy, and location may significantly affect a user’s privacy and confidentiality interests.” Educational institutions need to check the data whether it is to reside within their legal jurisdiction. Therefore, security concerns about cloud-based E-learning products are critical, and essential security measures should be implemented to protect valuable data.

By Mojgan Afshari

About Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

SYNDICATED NEWS SOURCES

Linux Distributor Red Hat Reports 20.6 Percent Rise In Revenue

By CloudBuzz | September 25, 2017

(Reuters) – Red Hat Inc (RHT.N) reported a 20.6 percent rise in quarterly revenue as the Linux operating system distributor benefited from higher demand for its products targeting hybrid cloud. Net income rose to $96.9 million, or 53 cents per…

Cloudflare Announces Unmetered Mitigation to Make Attacks a Thing of the Past

By CloudBuzz | September 25, 2017

Eliminates “surge pricing” that had been standard in the DDoS mitigation space SAN FRANCISCO, Sept. 25, 2017 (GLOBE NEWSWIRE) — Cloudflare, the leading Internet performance and security company, today announced Unmetered Mitigation, giving customers unlimited and unmetered distributed denial-of-service (DDoS) attack…

IDC – Cognitive and Artificial Intelligence Systems to Reach $57.6 Billion in 2021

By CloudBuzz | September 25, 2017

IDC Spending Guide Forecasts Worldwide Spending on Cognitive and Artificial Intelligence Systems to Reach $57.6 Billion in 2021 FRAMINGHAM, Mass., September 25, 2017 – Worldwide spending on cognitive and artificial intelligence (AI) systems is forecast to reach $57.6 billion in 2021,…

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…