=Paper=
{{Paper
|id=Vol-2861/paper_34
|storemode=property
|title=Information Security Risks of Distance Learning Software in the Sphere of Education as an Element of Critical Information Infrastructure
|pdfUrl=https://ceur-ws.org/Vol-2861/paper_34.pdf
|volume=Vol-2861
|authors=Yuriy Sosnovskiy,Veronika Ilyina,Victor Milyukov
}}
==Information Security Risks of Distance Learning Software in the Sphere of Education as an Element of Critical Information Infrastructure==
Information Security Risks of Distance Learning Software in the
Sphere of Education as an Element of Critical Information
Infrastructure
Yuriy Sosnovskiy a, Veronika Ilyina a and Victor Milyukov a
a
Institute of Physics and Technical Sciences, Crimean Federal V. Vernadsky University, 265007, Russian
Federation
Abstract
A number of software tools, that can be used in the organization of distance learning
interaction via the Internet, has been studied in the paper. The tools have been analyzed
against basic conditions of information security accreditation, such as a secure data transfer
protocol, personal data transfer to a third party, cases of hacking, and sanctions restrictions to
date.
Information security risks of a teacher’s digital tools have been evaluated taking into account
the broad scope of the educational process and the number of its participants. The damage
from the use of such tools has been related to the one from critical information infrastructure
control objects.
Keywords 1
Information security, a teacher’s digital tools, distance learning
1. Introduction
The global economy is rapidly going digital. The patterns of interaction between economic and
legal entities and, which is of utmost importance, educational institutions activities that can be
converted into electronic format are also undergoing digital transformations. As a result, distance
learning is becoming increasingly popular. Such distance form of educational interaction is cheaper
for all the parties of the educational process, and there also appear more and more teacher’s digital
tools (TDT) that facilitate such interaction.
2. Purpose and objectives of the research
Today, the typical forms of interaction between an educational establishment and a student in the
Russian Federation imply the following:
An educational organization must have an electronic information and educational environment
(EIEE). Its main objectives are set out in the Federal state educational standards, and it should provide
[1]:
free access to the curricula, work programs of the modules, internship and courses, as well as
to educational publications in the electronic form and educational resources on the Internet;
saving the student's completed assignments and the grades [1].
If a training program is implemented using e-learning or distance learning (if it is licensed), the
EIE should additionally provide [1]:
SLET-2020: International Scientific Conference on Innovative Approaches to the Application of Digital Technologies in Education,
November 12-13, 2020, Stavropol, Russia
EMAIL: sosnovskiy.yv@cfuv.ru (Yuriy Sosnovskiy); nika.ilyina@mail.ru (Veronika Ilyina); milyukov.vv@cfuv.ru (Victor Milyukov)
ORCID: 0000-0003-3807-5297 (Yuriy Sosnovskiy); 0000-0003-4165-5620 (Veronika Ilyina); 0000-0002-0429-8540 (Victor Milyukov)
©️ 2020 Copyright for this paper by its authors.
Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR Workshop Proceedings (CEUR-WS.org)
292
recording of the educational process events and keeping track of the students’ progress in the
course of mastering the educational curriculum;
asynchronous and synchronous interaction between students and teachers.
Federal state standards for secondary education [2] contain more detailed requirements for the
information and educational environment of the organization (IEE), which should provide:
information and methodological support for educational activities;
organization of various forms of individual and group activities;
monitoring and recording the progress and results of educational activities;
modern procedures and tools for creating, searching, collecting, analyzing, processing, storing
and presenting information;
interaction between all the participants in the distance learning process.
It should be noted that the requirement that the EIEE should ensure the interaction between the
participants in the educational process is only stipulated for the educational programs that include
electronic or distance learning forms of the educational process, which is not often common practice.
But unfortunately, EIEE does not always have enough tools to meet all the needs of the educational
process participants in terms of electronic interaction.
As practice shows, in a considerable number of cases, EIEE is implemented so as to meet the
requirements of the regulatory authorities. At the same time, such limited tool set does not provide
convenient instruments for communication and, as a result, progressive teachers have to look for their
own methods of transmitting and distributing electronic educational materials, and to use the TDT
that are more suitable for them.
Figure 1: Typical electronic interaction between the educational establishment and the student
Thus, the importance of a teacher’s digital tools, used to ensure electronic interaction between the
teacher and the student, significantly increases.
3. Digital tools of the teacher. Overview and analysis
3.1. BigBlueButton webinar platform
BigBlueButton platform (BBB) is a free software system for web conferences. The major problem
with the system is that the BigBlueButton client works using the browser extension for Adobe Flash,
official support for which ends in 2020. Another disadvantage is relatively high pressure on the
server's computational capacity. The features of the BBB system are as follows [3]:
supports working simultaneously with a large group of students, for example, up to 100
people or more;
provides video recording function. You can also save images and notes that were created on
the electronic board during the lecture;
293
the BBB platform can be integrated with Moodle due to a special module.
At the same time, the system is based on outdated technologies, and BBB does not work on Apple
computers and smartphones with iOS.
3.2. Discord messenger platform
Discord is a popular application that is used primarily for voice communication. It was
experimentally established that the optimal number of participants is up to 25-30 people. The
maximum number allowed by the system is 50 people.
The system has some features particularly useful for the educational process:
provides high-quality voice communication in the "General chat" mode. The minimum
computer system requirements are reasonable, and there are modes both for automatically turning
on the microphone and for using the dedicated button;
allows you to arrange a streaming broadcast of the desktop screen or selected windows on
your computer;
it is possible to work both in the application and directly from the browser, which is
convenient
At the same time, as the practice of using this software tool during the distance learning process
has shown, it is advisable to introduce a local administrator of virtual servers and platform channels to
correctly organize the interaction between the participants. The platform enables you to work
effectively when active oral interaction is required both individually and in small groups – for
practical work, collecting reports on laboratory work, and for lecturing in small groups.
3.3. YouTube as a platform for hosting online lectures
For a teacher YouTube has the following advantages:
provides storage and seamless access to video contents;
has convenient tools for analyzing users’ viewing, which allows you to identify fragments of
lectures or videos that arouse the greatest interest in the audience;
video materials can be distributed among the students and also in the public domain.
3.4. Programs for remote computer management
Sometimes when working individually students can come across the problems which solutions
require tutor’s assistance. In this case, it is convenient to use programs that provide remote computer
management. An example is the TeamViewer program.
The program provides not only computer management but also collaboration facilities. You can
work collaboratively on documents online in real time, work effectively on software codes and other
materials, and also – in the areas that don't have ready-made solutions.
All major operating systems are supported: Windows, MacOS, Linux, iOS, and Android. Among
the features of the program, there is also holding online conferences, which though has a limit of 25
participants. At the same time, it should be noted that this program poses a potential threat to the
information security of the user's computer due to the potential vulnerabilities of both the program
and the need to open port 5938 for external access via TCP/UDP protocols.
3.5. Online conference programs. ZOOM
ZOOM is one of the most popular programs for online conferencing. Unlike BigBlueButton and
many similar systems that use Adobe Flash technology for video transmission, ZOOM has
implemented a real-time video content transmission technology — WebRTC (Web Real-Time
Communication). You can set a password for the conference, invite participants by URL or email, and
broadcast audio and images from your computer. There is a 40-minute limit on the length of the
session for a free account.
294
It is also worth noting that in some regions, the use of this program without additional software is
simply impossible due to various political issues and related restrictions. In addition, there is a
significant number of instances when critical vulnerabilities were discovered in Zoom: for example,
the MacOS user has to join a Zoom call with an activated video camera, what is more, there is no
request for the authorization of switching on the camera; unauthorized connections to the broadcasts
of strange people, password leaks, etc.
3.6. Programs for graphic illustrations. Online boards
In the process of distance learning, it is often essential to illustrate materials and get continuous
feedbackб just as a teacher often does in a traditional classroom using a board or a smart- board. A
teacher can arrange voice interaction via а convenient program, such as Discord, described above.
And as to visualization, it can be effected through, for example, the AWWApp service. It does not
require installation, you just need to go to the site, send your students an invitation to join the session,
and work with the screen just as with a real board. In the graphics space you can make drawings,
insert formulas, notes, etc. Due to the fact that the graphics space is shared, all participants can work
in it at the same time. Accordingly, the teacher can give graphic tasks to the students and monitor
their performance in the live mode.
The free version contains advertisements unlike the fee-based version. Also, with the paid version
you can create multiple pages and upload files in .pdf format to the graphics space.
3.7. Video broadcasts in social networks
Today, the vast majority of the educational process participants have accounts on social networks.
As an example, let us have a look at the Vkontakte network. It can be successfully used for distance
learning under the condition that so-called "broadcasts" are arranged. The advantages of providing
video content via social networks are the following:
• students just need to click on the link to the broadcast, there is no need to download any
special application;
• the broadcast record is saved on the author's page and can be viewed at any convenient time;
• the record can be viewed by all those who take interest in the subject, which is both a
disadvantage if you need to limit the number of viewers, and an advantage if you want to share the
information with a vast number of people.
At the same time, to organize broadcasting, the teacher needs to install video recorder software and
follow a certain algorithm for generating a unique broadcast key and making the broadcast itself.
3.8. Conclusions on information security of using a teacher’s digital tools
The basic criteria for evaluating the safety of using digital teacher's tools that can be useful to
ordinary users are shown in table 1.
Table 1
Basic criteria of TDT information security
Teacher’s Secure Personal data Administration Known Restrictions
digital tool protocol transfer to a difficulty instances of due to
(TDT) third party hacking sanctions
BugBlueButton TLS No High Unlikely No
(on your own
servers)
295
Continuation of the table 1
Basic criteria of TDT information security
Teacher’s Secure Personal data Administration Known Restrictions
digital tool protocol transfer to a difficulty instances of due to
(TDT) third party hacking sanctions
Discord end-to-end: Yes Average Yes No
TLS, DTLS,
xsalsa20
YouTube Yes Yes Average Leakage of No
users’
passwords
TeamViewer 2048-bit keys Yes, when Moderate Leakage of Yes
RSA and 256- registering an users’
bit AES-by account passwords,
encrypting hacking
sessions through
TeamViewer
ID
ZOOM TLS * Yes, Moderate Multiple Yes
registration is reports
required about the
issues [4]
AWWApp, TLS No Minimum No No
basic version
Broadcasting in TLS Yes, Average Leakage of No
VK registration is users’
required** passwords
* end-to-end encryption was declared. However, in practice, it is the usual TLS and a video stream
is open to ZOOM servers
** Vkontakte is a Russian company. Website vk.com is listed in the register of information
dissemination organizers under the number 4-PP, the date of its entry is September 4, 2014.
The analysis of the table shows that the majority of the TDT have an extremely high vulnerability
from external cyber threats, as well as from the international restrictions policy, which also applies to
the software market, including access to information resources.
Table 2
Features of storing and processing user data
Teacher’s Compliance with regulatory Use of cryptographic Location of the
digital tools documents on storage and information security hosting (the Russian
processing of personal data tools (CIST) with up-to- Federation / not the
in information systems date Federal Security Russian Federation)
Service (FSS)
certificates
BugBlueButton Yes, no client registration is Technically possible RF (technically
(on your own required. possible)
servers)
Discord No, when registering a real No Not RF
full name
296
Continuation of the table 2
Features of storing and processing user data
Teacher’s Compliance with regulatory Use of cryptographic Location of the
digital tools documents on storage and information security hosting (the Russian
processing of personal data tools (CIST) with up-to- Federation / not the
in information systems date Federal Security Russian Federation)
Service (FSS)
certificates
BugBlueButton Yes, no client registration is Technically possible RF (technically
(on your own required. possible)
servers)
Discord No, when registering a real No Not RF
full name
YouTube No, when registering a real No Not RF
full name, because the same
email address as in Google is
used.
TeamViewer Does not require a full No Not RF
name, only a nickname and
an email address.
ZOOM No registration required on No Not RF
the client side
AWWApp No registration required for No Not RF
basic version basic functionality
VK broadcasts ** declared compliance with RF Average
the rules 152-FL on handling
of personal data
* linking the account to the e-mail address is required. In this case, the user's data can be
considered as personal data (PD)
** it is not explicitly stated in the user rules in VK that the requirements of the legislation of the
Russian Federation for storing, transmitting and processing personal data are fulfilled
(https://vk.com/privacy). The rules for protecting VK Connect user information are a part of the VK
Ecosystem and contain links to 152-Federal Law.
Despite that, the number of users of these and similar services is estimated as tens and hundreds of
thousands only in the Russian Federation. In the context of restrictions related to the spread of
coronavirus, the requirements for the stability of services, as well as the requirements for compliance
with Russian legislation in the field of personal data processing, become important [5].
Unfortunately, in most cases, these standards are not met. Table 2 shows the technical features of
storing and processing user data, which according to [5] can be classified as personal data.Having
analyzed the features of TDT in terms of storage and processing user data, and also the registration
requirements, we selected some TDT that can be used by tutors and educational establishments at
minimum cost and at low risk of violating the regulations of the Russian Federation relating to
personal data processing:
• BigBlueButton webinar system. It is possible to install the system on the organization's own
server or even on a teacher’s personal computer (as was performed at the Department of Computer
Engineering and Modeling of the Institute of Physics and Technical Sciences, Crimean Federal V.
I. Vernadsky University). Students are not required to register and submit their personal data – to
get connected they follow a link;
• AWWApp-interactive online whiteboard. Basic functionality (free illustrations, selection of
tools, background loading of images and pdf-files, etc.) does not require registration for both
teachers and students;
297
• using the functionality of the social network Vkontakte. Registration and confirmation of the
phone number are required. At the same time, Vkontakte places its servers on the territory of the
Russian Federation and declares compliance with the norms of 152-FL.
However, the TDT being under consideration, and many others are subject not only to the personal
data information security threats but also to various other information security threats, which can
occur any time.
4. Information security risks and equivalent damages
If the upper segment of the TDT (servers), communication channels, or lower-level devices (user
devices) are affected by information and technical interference, there can occur a disruption of the
educational process for some time. The examples of real problems that the participants of the
educational process face are:
• inability to connect to the broadcast streaming;
• electronic services failure, lagging, etc.;
• indirect threats related to the leakage or deliberate misuse of the user's personal data by the
service.
For an individual participant of the educational process, the above-mentioned issues may not be
critical, but the number of people involved in the process can be substantial and can significantly (a
hundredfold or even thousands of times) surpass the number of those people who are negatively
affected by misfunctions of the automated control systems, classified as critical information
infrastructure (in the commonly used meaning of this definition).
Some of the indicators for assessing the security of the automated systems are the probability (or
frequency) of successful computer attacks (CA), that cause the transition of the system to a state of
misfunction or failure (PCAi), and the notional value of damage from a single CA ( ), where i is the
i
index of the CA kind and the damage corresponding to it. Risk is most often understood as the
product of the following parameters:
N (1)
RCA PCA,i i ,
i 1
The regulatory documents – All-Union State Standard and IEC on risks – contain a list of
methodology for assessing the risk, such as: RIA, HAZOP, HACCP, SWIFT, and others [6]. A
multidisciplinary approach can be applied to risk assessment, as risks can result from a wide range of
causes and have a large number of consequences. However, in practice they are all qualitatively
defined on the basis of brainstorming, expert experience, scenario analysis, etc.
As a result, in most cases in practice, the notion ‘damage’ is considered to be some notional value.
At the same time, in jurisprudence, the damage is almost always assessed from both sides: material
and moral, which, of course, have some financial equivalent [7].
To be able to compare risks, their characteristics should be comparable. First, we are going to
consider automated control systems (ACS) and the impact that computer attacks have on them. We
are going to deal with the risks that do not lead to human death (in order to avoid interference with the
moral issue). All the same, such risks do damage to the health of the people involved in the critical
information infrastructure functioning. Financial damage, in this case, can be expressed as the sum of
the money paid off to each sufferer ( N O ) to cover the costs of treatment ci , temporary loss of labour
capacity d i , moral, or non-pecuniary, damage U i , which, as has been said, can also be assessed in
monetary terms, just as it happens in jurisprudence.
N0 (2)
0 ci di U i ,
i 1
Non-pecuniary damage may be translated into a financial equivalent with some margin of error .
Similarly, the harm done to the reputation and risks of the disruption of teacher's digital tools
functioning lead to a "moral damage" for state bodies and the system of education, since the number
of people affected is extremely large. Consequently, such reputational risks can also be assessed in
298
financial terms. What is more, additional financial resources are required to organize explanatory and
other corrective work with the population in order to maintain the overall level of satisfaction at a
certain level. The formula (3) for calculating the financial equivalent of the damage IS caused by the
negative impact on the TDT is similar to (2):
N IS (3)
IS ci di U i ,
i 1
where the majority of i: сi , di 0 , however N IS No .
When comparing the damage magnitudes O and IS , it is possible to note the main difference,
which is the following: N IS No . This leads us to the conclusion that in case of computer attacks
on the information infrastructure used for educational purposes, the damage values O and IS ,
expressed in notional financial equivalent, are comparable in order of magnitude.
5. Conclusion
Based on the analysis of TDT, we can conclude that there is a wide range of such programs. At the
same time, in terms of their compliance with Russian legislation on personal data protection and from
the standpoint of so-called "digital sovereignty", the choice is significantly narrowed down to several
programs. The basic parameters of a teacher’s digital tools are presented in tables 1 and 2, but just a
few of the products can be recommended.
The damage, expressed in the notional financial equivalent, done to a typical information system
relating to objects of critical information infrastructure (CII) O and the damage to an information
system used for educational activities – a teacher's digital tool IS – are comparable in order of
magnitude.
Consequently, it becomes obvious that it is important to pay particular attention to TDT that
should be easy to use, have minimal system requirements and, at the same time, provide a high level
of protection from computer attacks and sanctions pressure.
6. References
[1] Federal State Educational Standard of Higher Education - Bachelor's degree in 09.03.01
Informatics and computer technology. Approved by order of the Ministry of Education and
Science of the Russian Federation on September 19, 2017 No. 929.
[2] Ministry of Education and Science of the Russian Federation. Order of October 6, 2009 No. 413
"On the approval and implementation of the Federal State Educational Standard for General
Secondary Education."
[3] Digital tools of the teacher. Experience of the Department of Computer Engineering and
Modeling of the Physics and Technical Sciences Institute. 2020. URL:
https://cfuv.ru/news/cifrovye-instrumenty-prepodavatelya-opyt-kafedry-kompyuternojj-
inzhenerii-i-modelirovaniya-fiziko-tekhnicheskogo-instituta.
[4] Zoom is Leaking Peoples' Email Addresses and Photos to Strangers / Joseph Cox // Vice, 2020.
URL: https://www.vice.com/en_us/article/k7e95m/zoom-leaking-email-addresses-photos.
[5] Federal Law "On Personal Data" of July 27, 2006 No. 152-FL.
[6] All-Union State Standard ISO / IEC 31010 - 2011 Risk management Risk assessment methods
Moscow Standardinform 2012. Approved and put into effect by the Order of the Federal Agency
for Technical Regulation and Metrology No. 680-st 4 of December 1, 2011.
[7] Ibragimova Aminat Ibragimovna Civil law essence and definition of the concepts of harm and
loss // Problems of Economics and Legal Practice. 2013. No. 5. URL:
https://cyberleninka.ru/article/n/grazhdansko-pravovaya-suschnost-i-opredelenie-ponyatiy-vreda-
i-ubytkov.
299