<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>November</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Information Security Risks of Distance Learning Software in the Sphere of Education as an Element of Critical Information Infrastructure</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Federation</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Physics and Technical Sciences, Crimean Federal V. Vernadsky University</institution>
          ,
          <addr-line>265007, Russian</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <fpage>2</fpage>
      <lpage>13</lpage>
      <abstract>
        <p>date. A number of software tools, that can be used in the organization of distance learning interaction via the Internet, has been studied in the paper. The tools have been analyzed against basic conditions of information security accreditation, such as a secure data transfer protocol, personal data transfer to a third party, cases of hacking, and sanctions restrictions to Information security risks of a teacher's digital tools have been evaluated taking into account the broad scope of the educational process and the number of its participants. The damage from the use of such tools has been related to the one from critical information infrastructure control objects. Information security, a teacher's digital tools, distance learning SLET-2020: International Scientific Conference on Innovative Approaches to the Application of Digital Technologies in Education, ORCID: 0000-0003-3807-5297 (Yuriy Sosnovskiy); 0000-0003-4165-5620 (Veronika Ilyina); 0000-0002-0429-8540 (Victor Milyukov)</p>
      </abstract>
      <kwd-group>
        <kwd>Critical</kwd>
        <kwd>Information</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The global economy is rapidly going digital. The patterns of interaction between economic and
legal entities and, which is of utmost importance, educational institutions activities that can be
converted into electronic format are also undergoing digital transformations. As a result, distance
learning is becoming increasingly popular. Such distance form of educational interaction is cheaper
for all the parties of the educational process, and there also appear more and more teacher’s digital
tools (TDT) that facilitate such interaction.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Purpose and objectives of the research</title>
      <sec id="sec-2-1">
        <title>Today, the typical forms of interaction between an educational establishment and a student in the</title>
      </sec>
      <sec id="sec-2-2">
        <title>Russian Federation imply the following: An educational organization must have an electronic information and educational environment (EIEE). Its main objectives are set out in the Federal state educational standards, and it should provide [1]:</title>
        <p>
          

saving the student's completed assignments and the grades [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>free access to the curricula, work programs of the modules, internship and courses, as well as
to educational publications in the electronic form and educational resources on the Internet;</p>
      </sec>
      <sec id="sec-2-3">
        <title>If a training program is implemented using e-learning or distance learning (if it is licensed), the</title>
      </sec>
      <sec id="sec-2-4">
        <title>EIE should additionally provide [1]:</title>
        <p>2020 Copyright for this paper by its authors.
 recording of the educational process events and keeping track of the students’ progress in the
course of mastering the educational curriculum;
 asynchronous and synchronous interaction between students and teachers.</p>
        <p>
          Federal state standards for secondary education [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] contain more detailed requirements for the
information and educational environment of the organization (IEE), which should provide:
 information and methodological support for educational activities;
 organization of various forms of individual and group activities;
 monitoring and recording the progress and results of educational activities;
 modern procedures and tools for creating, searching, collecting, analyzing, processing, storing
and presenting information;
 interaction between all the participants in the distance learning process.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>It should be noted that the requirement that the EIEE should ensure the interaction between the</title>
        <p>participants in the educational process is only stipulated for the educational programs that include
electronic or distance learning forms of the educational process, which is not often common practice.
But unfortunately, EIEE does not always have enough tools to meet all the needs of the educational
process participants in terms of electronic interaction.</p>
      </sec>
      <sec id="sec-2-6">
        <title>As practice shows, in a considerable number of cases, EIEE is implemented so as to meet the</title>
        <p>requirements of the regulatory authorities. At the same time, such limited tool set does not provide
convenient instruments for communication and, as a result, progressive teachers have to look for their
own methods of transmitting and distributing electronic educational materials, and to use the TDT
that are more suitable for them.</p>
      </sec>
      <sec id="sec-2-7">
        <title>Thus, the importance of a teacher’s digital tools, used to ensure electronic interaction between the teacher and the student, significantly increases.</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Digital tools of the teacher. Overview and analysis</title>
    </sec>
    <sec id="sec-4">
      <title>3.1. BigBlueButton webinar platform</title>
      <p>
        BigBlueButton platform (BBB) is a free software system for web conferences. The major problem
with the system is that the BigBlueButton client works using the browser extension for Adobe Flash,
official support for which ends in 2020. Another disadvantage is relatively high pressure on the
server's computational capacity. The features of the BBB system are as follows [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]:
 supports working simultaneously with a large group of students, for example, up to 100
people or more;
 provides video recording function. You can also save images and notes that were created on
the electronic board during the lecture;
 the BBB platform can be integrated with Moodle due to a special module.
      </p>
      <sec id="sec-4-1">
        <title>At the same time, the system is based on outdated technologies, and BBB does not work on Apple computers and smartphones with iOS.</title>
        <p>3.2.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Discord messenger platform</title>
      <sec id="sec-5-1">
        <title>Discord is a popular application that is used primarily for voice communication. It was</title>
        <p>experimentally established that the optimal number of participants is up to 25-30 people. The
maximum number allowed by the system is 50 people.</p>
        <p>The system has some features particularly useful for the educational process:
 provides high-quality voice communication in the "General chat" mode. The minimum
computer system requirements are reasonable, and there are modes both for automatically turning
on the microphone and for using the dedicated button;
 allows you to arrange a streaming broadcast of the desktop screen or selected windows on
your computer;
 it is possible to work both in the application and directly from the browser, which is
convenient</p>
      </sec>
      <sec id="sec-5-2">
        <title>At the same time, as the practice of using this software tool during the distance learning process</title>
        <p>has shown, it is advisable to introduce a local administrator of virtual servers and platform channels to
correctly organize the interaction between the participants. The platform enables you to work
effectively when active oral interaction is required both individually and in small groups – for
practical work, collecting reports on laboratory work, and for lecturing in small groups.
3.3.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>YouTube as a platform for hosting online lectures</title>
      <sec id="sec-6-1">
        <title>For a teacher YouTube has the following advantages:</title>
        <p> provides storage and seamless access to video contents;
 has convenient tools for analyzing users’ viewing, which allows you to identify fragments of
lectures or videos that arouse the greatest interest in the audience;
 video materials can be distributed among the students and also in the public domain.
3.4.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Programs for remote computer management</title>
      <sec id="sec-7-1">
        <title>Sometimes when working individually students can come across the problems which solutions require tutor’s assistance. In this case, it is convenient to use programs that provide remote computer management. An example is the TeamViewer program.</title>
      </sec>
      <sec id="sec-7-2">
        <title>The program provides not only computer management but also collaboration facilities. You can</title>
        <p>work collaboratively on documents online in real time, work effectively on software codes and other
materials, and also – in the areas that don't have ready-made solutions.</p>
      </sec>
      <sec id="sec-7-3">
        <title>All major operating systems are supported: Windows, MacOS, Linux, iOS, and Android. Among</title>
        <p>the features of the program, there is also holding online conferences, which though has a limit of 25
participants. At the same time, it should be noted that this program poses a potential threat to the
information security of the user's computer due to the potential vulnerabilities of both the program
and the need to open port 5938 for external access via TCP/UDP protocols.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>3.5. Online conference programs. ZOOM</title>
      <sec id="sec-8-1">
        <title>ZOOM is one of the most popular programs for online conferencing. Unlike BigBlueButton and</title>
        <p>many similar systems that use Adobe Flash technology for video transmission, ZOOM has
implemented a real-time video content transmission technology — WebRTC (Web Real-Time
Communication). You can set a password for the conference, invite participants by URL or email, and
broadcast audio and images from your computer. There is a 40-minute limit on the length of the
session for a free account.</p>
        <p>It is also worth noting that in some regions, the use of this program without additional software is
simply impossible due to various political issues and related restrictions. In addition, there is a
significant number of instances when critical vulnerabilities were discovered in Zoom: for example,
the MacOS user has to join a Zoom call with an activated video camera, what is more, there is no
request for the authorization of switching on the camera; unauthorized connections to the broadcasts
of strange people, password leaks, etc.
3.6.</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Programs for graphic illustrations. Online boards</title>
      <sec id="sec-9-1">
        <title>In the process of distance learning, it is often essential to illustrate materials and get continuous</title>
        <p>feedbackб just as a teacher often does in a traditional classroom using a board or a smart- board. A
teacher can arrange voice interaction via а convenient program, such as Discord, described above.
And as to visualization, it can be effected through, for example, the AWWApp service. It does not
require installation, you just need to go to the site, send your students an invitation to join the session,
and work with the screen just as with a real board. In the graphics space you can make drawings,
insert formulas, notes, etc. Due to the fact that the graphics space is shared, all participants can work
in it at the same time. Accordingly, the teacher can give graphic tasks to the students and monitor
their performance in the live mode.</p>
      </sec>
      <sec id="sec-9-2">
        <title>The free version contains advertisements unlike the fee-based version. Also, with the paid version you can create multiple pages and upload files in .pdf format to the graphics space.</title>
        <p>3.7.</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>Video broadcasts in social networks</title>
      <sec id="sec-10-1">
        <title>Today, the vast majority of the educational process participants have accounts on social networks.</title>
        <p>As an example, let us have a look at the Vkontakte network. It can be successfully used for distance
learning under the condition that so-called "broadcasts" are arranged. The advantages of providing
video content via social networks are the following:
• students just need to click on the link to the broadcast, there is no need to download any
special application;
• the broadcast record is saved on the author's page and can be viewed at any convenient time;
• the record can be viewed by all those who take interest in the subject, which is both a
disadvantage if you need to limit the number of viewers, and an advantage if you want to share the
information with a vast number of people.</p>
      </sec>
      <sec id="sec-10-2">
        <title>At the same time, to organize broadcasting, the teacher needs to install video recorder software and follow a certain algorithm for generating a unique broadcast key and making the broadcast itself.</title>
        <p>3.8.</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Conclusions on information security of using a teacher’s digital tools</title>
      <sec id="sec-11-1">
        <title>The basic criteria for evaluating the safety of using digital teacher's tools that can be useful to ordinary users are shown in table 1.</title>
        <sec id="sec-11-1-1">
          <title>Continuation of the table 1</title>
          <p>Basic criteria of TDT information security</p>
          <p>Teacher’s Secure Personal data
digital tool protocol transfer to a
(TDT) third party
Discord Yes
end-to-end:
TLS, DTLS,
xsalsa20</p>
          <p>Yes
2048-bit keys
RSA and
256bit AES-by
encrypting
sessions</p>
          <p>TLS *
TLS</p>
          <p>Yes</p>
          <p>Yes, when
registering an
account</p>
          <p>Yes,
registration is
required</p>
          <p>No</p>
          <p>YouTube
TeamViewer</p>
          <p>ZOOM</p>
          <p>AWWApp,
basic version
Broadcasting in</p>
          <p>VK
Average
Average
Moderate
Moderate
Minimum</p>
          <p>Known
instances of
hacking</p>
          <p>Yes
Leakage of</p>
          <p>users’
passwords
Leakage of</p>
          <p>users’
passwords,
hacking
through
TeamViewer</p>
          <p>
            ID
Multiple
reports
about the
issues [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ]
          </p>
          <p>No
No
Yes
Yes
No
TLS Yes, Average Leakage of No
registration is users’</p>
          <p>required** passwords
* end-to-end encryption was declared. However, in practice, it is the usual TLS and a video stream
is open to ZOOM servers</p>
          <p>** Vkontakte is a Russian company. Website vk.com is listed in the register of information
dissemination organizers under the number 4-PP, the date of its entry is September 4, 2014.</p>
        </sec>
      </sec>
      <sec id="sec-11-2">
        <title>The analysis of the table shows that the majority of the TDT have an extremely high vulnerability from external cyber threats, as well as from the international restrictions policy, which also applies to the software market, including access to information resources.</title>
        <sec id="sec-11-2-1">
          <title>Continuation of the table 2</title>
          <p>Features of storing and processing user data
Teacher’s
digital tools
BugBlueButton
(on your own
servers)
Discord</p>
          <p>Compliance with regulatory
documents on storage and
processing of personal data</p>
          <p>in information systems
Yes, no client registration is
required.</p>
          <p>Use of cryptographic
information security
tools (CIST) with
up-todate Federal Security</p>
          <p>Service (FSS)
certificates
Technically possible</p>
        </sec>
      </sec>
      <sec id="sec-11-3">
        <title>Despite that, the number of users of these and similar services is estimated as tens and hundreds of</title>
        <p>
          thousands only in the Russian Federation. In the context of restrictions related to the spread of
coronavirus, the requirements for the stability of services, as well as the requirements for compliance
with Russian legislation in the field of personal data processing, become important [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>
          Unfortunately, in most cases, these standards are not met. Table 2 shows the technical features of
storing and processing user data, which according to [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] can be classified as personal data.Having
analyzed the features of TDT in terms of storage and processing user data, and also the registration
requirements, we selected some TDT that can be used by tutors and educational establishments at
minimum cost and at low risk of violating the regulations of the Russian Federation relating to
personal data processing:
• BigBlueButton webinar system. It is possible to install the system on the organization's own
server or even on a teacher’s personal computer (as was performed at the Department of Computer
        </p>
      </sec>
      <sec id="sec-11-4">
        <title>Engineering and Modeling of the Institute of Physics and Technical Sciences, Crimean Federal V.</title>
        <p>I. Vernadsky University). Students are not required to register and submit their personal data – to
get connected they follow a link;
• AWWApp-interactive online whiteboard. Basic functionality (free illustrations, selection of
tools, background loading of images and pdf-files, etc.) does not require registration for both
teachers and students;
• using the functionality of the social network Vkontakte. Registration and confirmation of the
phone number are required. At the same time, Vkontakte places its servers on the territory of the</p>
      </sec>
      <sec id="sec-11-5">
        <title>Russian Federation and declares compliance with the norms of 152-FL.</title>
      </sec>
      <sec id="sec-11-6">
        <title>However, the TDT being under consideration, and many others are subject not only to the personal data information security threats but also to various other information security threats, which can occur any time.</title>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>4. Information security risks and equivalent damages</title>
      <p>If the upper segment of the TDT (servers), communication channels, or lower-level devices (user
devices) are affected by information and technical interference, there can occur a disruption of the
educational process for some time. The examples of real problems that the participants of the
educational process face are:
• inability to connect to the broadcast streaming;
• electronic services failure, lagging, etc.;
• indirect threats related to the leakage or deliberate misuse of the user's personal data by the
service.</p>
      <sec id="sec-12-1">
        <title>For an individual participant of the educational process, the above-mentioned issues may not be</title>
        <p>critical, but the number of people involved in the process can be substantial and can significantly (a
hundredfold or even thousands of times) surpass the number of those people who are negatively
affected by misfunctions of the automated control systems, classified as critical information
infrastructure (in the commonly used meaning of this definition).</p>
      </sec>
      <sec id="sec-12-2">
        <title>Some of the indicators for assessing the security of the automated systems are the probability (or</title>
        <p>frequency) of successful computer attacks (CA), that cause the transition of the system to a state of
misfunction or failure (PCAi), and the notional value of damage from a single CA ( ), where i is the
i
index of the CA kind and the damage corresponding to it. Risk is most often understood as the
product of the following parameters:</p>
        <p>N (1)
RCA  PCA,i  i ,</p>
        <p>i1</p>
      </sec>
      <sec id="sec-12-3">
        <title>The regulatory documents – All-Union State Standard and IEC on risks – contain a list of</title>
        <p>
          methodology for assessing the risk, such as: RIA, HAZOP, HACCP, SWIFT, and others [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. A
multidisciplinary approach can be applied to risk assessment, as risks can result from a wide range of
causes and have a large number of consequences. However, in practice they are all qualitatively
defined on the basis of brainstorming, expert experience, scenario analysis, etc.
        </p>
      </sec>
      <sec id="sec-12-4">
        <title>As a result, in most cases in practice, the notion ‘damage’ is considered to be some notional value. At the same time, in jurisprudence, the damage is almost always assessed from both sides: material and moral, which, of course, have some financial equivalent [7].</title>
        <p>To be able to compare risks, their characteristics should be comparable. First, we are going to
consider automated control systems (ACS) and the impact that computer attacks have on them. We
are going to deal with the risks that do not lead to human death (in order to avoid interference with the
moral issue). All the same, such risks do damage to the health of the people involved in the critical
information infrastructure functioning. Financial damage, in this case, can be expressed as the sum of
the money paid off to each sufferer ( NO ) to cover the costs of treatment ci , temporary loss of labour
capacity di , moral, or non-pecuniary, damageUi , which, as has been said, can also be assessed in
monetary terms, just as it happens in jurisprudence.</p>
        <p>N0 (2)
 0   ci  di  Ui  ,</p>
        <p>i1</p>
        <p>Non-pecuniary damage may be translated into a financial equivalent with some margin of error  .
Similarly, the harm done to the reputation and risks of the disruption of teacher's digital tools
functioning lead to a "moral damage" for state bodies and the system of education, since the number
of people affected is extremely large. Consequently, such reputational risks can also be assessed in
negative impact on the TDT is similar to (2):</p>
        <p>NIS
 IS  ci  di  Ui ,
i1
(3)
where the majority of i: сi , di  0 , however NIS  N .
o</p>
        <p>When comparing the damage magnitudes  O and  IS , it is possible to note the main difference,
which is the following: NIS  No . This leads us to the conclusion that in case of computer attacks
on the information infrastructure used for educational purposes, the damage values  O and  IS ,
expressed in notional financial equivalent, are comparable in order of magnitude.</p>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>5. Conclusion</title>
      <sec id="sec-13-1">
        <title>Based on the analysis of TDT, we can conclude that there is a wide range of such programs. At the</title>
        <p>same time, in terms of their compliance with Russian legislation on personal data protection and from
the standpoint of so-called "digital sovereignty", the choice is significantly narrowed down to several
programs. The basic parameters of a teacher’s digital tools are presented in tables 1 and 2, but just a
few of the products can be recommended.</p>
      </sec>
      <sec id="sec-13-2">
        <title>The damage, expressed in the notional financial equivalent, done to a typical information system</title>
        <p>relating to objects of critical information infrastructure (CII)  O and the damage to an information
system used for educational activities – a teacher's digital tool  IS – are comparable in order of
magnitude.</p>
      </sec>
      <sec id="sec-13-3">
        <title>Consequently, it becomes obvious that it is important to pay particular attention to TDT that should be easy to use, have minimal system requirements and, at the same time, provide a high level of protection from computer attacks and sanctions pressure.</title>
      </sec>
    </sec>
    <sec id="sec-14">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Federal</given-names>
            <surname>State</surname>
          </string-name>
          <article-title>Educational Standard of Higher Education - Bachelor's degree in 09.03.01 Informatics and computer technology</article-title>
          .
          <source>Approved by order of the Ministry of Education and Science of the Russian Federation on September 19</source>
          ,
          <year>2017</year>
          No.
          <volume>929</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Ministry of Education and Science of the Russian Federation</article-title>
          .
          <source>Order of October 6</source>
          , 2009 No.
          <article-title>413 "On the approval and implementation of the Federal State Educational Standard for General Secondary Education."</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] Digital tools of the teacher</article-title>
          .
          <source>Experience of the Department of Computer Engineering and Modeling of the Physics and Technical Sciences Institute</source>
          .
          <year>2020</year>
          . URL: https://cfuv.ru/news/cifrovye-instrumenty
          <article-title>-prepodavatelya-opyt-kafedry-kompyuternojjinzhenerii-i-modelirovaniya-fiziko-tekhnicheskogo-instituta.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] Zoom is Leaking Peoples' Email Addresses</article-title>
          and Photos to Strangers / Joseph Cox // Vice,
          <year>2020</year>
          . URL: https://www.vice.com/en_us/article/k7e95m/zoom
          <article-title>-leaking-email-addresses-photos.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>[5] Federal Law "On Personal Data" of July 27</source>
          ,
          <year>2006</year>
          No.
          <fpage>152</fpage>
          -FL.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>All-Union State Standard</surname>
            <given-names>ISO</given-names>
          </string-name>
          / IEC 31010
          <article-title>- 2011 Risk management Risk assessment methods Moscow Standardinform 2012</article-title>
          .
          <article-title>Approved and put into effect by the Order of the Federal Agency for Technical Regulation</article-title>
          and Metrology No. 680
          <source>-st 4 of December 1</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Ibragimova</given-names>
            <surname>Aminat Ibragimovna</surname>
          </string-name>
          <article-title>Civil law essence and definition of the concepts of harm</article-title>
          and loss // Problems of Economics and
          <string-name>
            <given-names>Legal</given-names>
            <surname>Practice</surname>
          </string-name>
          .
          <year>2013</year>
          . No.
          <article-title>5</article-title>
          . URL: https://cyberleninka.ru/article/n/grazhdansko
          <article-title>-pravovaya-suschnost-i-opredelenie-ponyatiy-vredai-ubytkov.</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>