<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Improving the Security Policy of the Distance Learning System based on the Zero Trust Concept</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pavlo Skladannyi</string-name>
          <email>p.skladannyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olexandr Trofimov</string-name>
          <email>trofimov@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktor Korniiets</string-name>
          <email>viktorkorniets@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksym Vorokhob</string-name>
          <email>m.vorokhob.asp@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Opryshko</string-name>
          <email>t.opryshko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Problems of Mathematical Machines and Systems</institution>
          ,
          <addr-line>42 Academician Glushkov ave., Kyiv, 03187</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>97</fpage>
      <lpage>106</lpage>
      <abstract>
        <p>The issue of automation of information technology support for distance learning is the subject of many studies and heated discussions among scientific and pedagogical workers, as well as the object of special attention from society. Existing software platforms supporting the educational process provide solutions mainly to problems of management of the digital learning environment, while only partially responding to challenges and threats from cyberspace and the potential for dishonest actions by participants in the educational process. The paper analyzes the characteristics of common learning management systems and identifies the security functions implemented in them. Based on the concept of Zero Trust, the paper proposes an appropriate threat model for the digital learning environment and formulates proposals for building an improved information security policy and implementing relevant mechanisms and architecture for Distance Learning System (DLS) security.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Distance learning system</kwd>
        <kwd>cyber security</kwd>
        <kwd>Zero Trust concept</kwd>
        <kwd>security threat model</kwd>
        <kwd>security mechanisms</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Distance learning spreads easily due to the
natural adaptability of young people to the
surrounding world and the technologies that
evolve in it [1]. The relevance and spread of this
education support technology began to grow
rapidly in the conditions of strict quarantine due
to the COVID-19 pandemic [2]. Recently,
advanced experience has been gained in the use of
distance learning tools for the training of
specialists in various fields of humanitarian and
natural sciences. In the conditions of martial law,
more and more Participants in the Educational
Process (PEP) are forced to switch to distance
learning, which determines the need to create
Distance Learning Systems (DLS), that by the
requirements of the law [3–5] can ensure the
protection of personal data processed and stored
in them, as well as to prevent unauthorized use of
educational resources of systems, violation of
their integrity and availability.</p>
      <p>A distance learning system is understood as a
set of hardware and software platforms, including
a Learning Management System (LMS),
educational information resources, methodical
support, and reporting documents, as well as
participants in the educational process who
support the functioning of the system and use it as
intended [6].</p>
      <p>
        The issue of automation of information
technology support for distance learning is the
subject of many studies and heated discussions
among scientific and pedagogical workers, as well
as the object of special attention from society. As
the world becomes increasingly digital, the need
for secure distance learning systems will only
grow, as there is no alternative to investing in
modern technologies to ensure the security of
digital learning environments. Lack of proper
attention to this issue can have negative
consequences in the medium and long term [
        <xref ref-type="bibr" rid="ref1 ref10">7, 8</xref>
        ].
      </p>
      <p>
        The analysis of the latest scientific and
practical publications on the construction of
reliable and safe DLS, as well as the state of
regulatory and legal support of the relevant
processes, shows the importance of conducting
research and development in the field of
information security of digital educational
environments [
        <xref ref-type="bibr" rid="ref11">9</xref>
        ].
      </p>
      <p>
        In particular, in [
        <xref ref-type="bibr" rid="ref12">10</xref>
        ] a comprehensive analysis
of the current situation regarding the application
of distance learning technologies in educational
establishments as a whole was carried out.
Technological solutions were identified that could
contribute to improving the results of the
application of such technologies in higher
educational institutions. In [
        <xref ref-type="bibr" rid="ref13">11</xref>
        ], based on
studying the requirements of legislation and
regulatory documents, the methodological
principles of building guarantee-capable protected
information DLS of higher education institutions
are determined. In [
        <xref ref-type="bibr" rid="ref14">12</xref>
        ] it was noted that learning
management systems, as an important component
of the educational environments of many
universities, support a significant number of
different types of activities and functions,
including aspects of protection. In [
        <xref ref-type="bibr" rid="ref15">13</xref>
        ], the
experience of using the common LMS Google
Classroom and general data on the principles of
building a software platform to support distance
learning of our development based on the
“clientserver” architecture are presented, while the issues
of protecting the educational environment are not
considered.
      </p>
      <p>
        Existing approaches to the construction of
information security policy and its components
are generally considered in international and
national standards [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20">14–18</xref>
        ], but consideration of
the peculiarities of the functioning of the
educational environment is left to the discretion of
designers and developers.
      </p>
      <p>
        The main provisions and architecture of the
concept of Zero Trust are given in [
        <xref ref-type="bibr" rid="ref21">19</xref>
        ], and in
[
        <xref ref-type="bibr" rid="ref22">20</xref>
        ]. In addition, the main directions of its
application within the framework of the
organization’s information security policy are
proposed.
      </p>
      <p>
        It should be noted that the analysis of the
publication [
        <xref ref-type="bibr" rid="ref23 ref24 ref25 ref26 ref27">21–25</xref>
        ] about the features of building
software platforms focused on e-learning and the
study of messages on PEP forums about the
presence of certain problematic situations
associated with the use of such platforms, indicate
their in complete compliance with the educational
process, which is defined by legislation [
        <xref ref-type="bibr" rid="ref28 ref29">26, 27</xref>
        ],
as well as requirements for information protection
[3–5]. One of the reasons for this situation is the
fact that the vast majority of popular educational
platforms, including those used in Ukraine, are
aimed at the international market and are not tied
to the legislation of specific countries.
      </p>
      <p>The review shows the efforts of scientists and
practitioners to solve the problem of building and
protecting the digital learning environment of
higher education institutions using different
approaches. However, the issue of improving their
information security policy is still an urgent task.</p>
      <p>
        Taking into account a detailed comparison of
the provisions of the concept of Zero Trust
[
        <xref ref-type="bibr" rid="ref21 ref22">19, 20</xref>
        ] and the features of the functioning of the
digital educational environment [
        <xref ref-type="bibr" rid="ref14 ref15 ref23 ref24 ref25 ref26 ref27">12, 13, 21–25</xref>
        ],
it is possible to assert the potential benefit of
applying the approaches of the concept to securing
valuable information resources of an educational
institution by improving the information security
policy of the institution and promoting academic
integrity in the digital environment.
      </p>
      <p>The purpose of the work is to develop and
research the principles and methods of building
the Information Security Policy of the domestic
distance learning system, including:
• Analysis and comparison of the state of
information security of common educational
platforms.
• Formation of a model of threats to the
DLS based on the concept of Zero Trust.
• Determination of practical aspects of
improving the information security policy
based on the concept of Zero Trust and
mechanisms for ensuring the protection of
information resources of the DLS.
2. Analysis of the Security Functions
of Common Educational Platforms
and Formation of a Threat Model
Based on the Zero Trust Concept</p>
      <p>
        Considering the publications [
        <xref ref-type="bibr" rid="ref23 ref24 ref25 ref26 ref27">21–25</xref>
        ] as a
basis, the information (Table 1) about the security
functions of common software systems of support
of the educational process (LMS) Moodle,
Blackboard, Canvas, Google Classroom, Khan
Academy (hereinafter products 1–5), which are
currently used by educational institutions, is
summarized.
      </p>
      <p>Taking into account the analysis of the
generalized data, it is possible to pay attention to
the fact that the “User authentication” function is
implemented in all identified systems, while
multifactor authentication is provided in products
1–4.</p>
      <p>The Access Control feature in the
abovementioned LMSs is mostly controlled by the
learning event organizer, and only in product 1
role-based access control is announced.</p>
      <p>The availability of the “Event monitoring,
logging” function in products 1, 3, and 5 allows to
monitor of the occurrence of certain incidents in
environments and facilitates investigation in cases
of undesirable situations.</p>
      <p>All products in one way or another provide
encryption of data transmitted between the server
and client browsers, in particular, using the Secure
Socket Layer (SSL) and Transport Layer Security
(TLS) protocols, which increases the security of
confidential information when it is forwarded
through an unprotected environment. At the same
time, only product 4 provides encryption of data
during their storage on servers.</p>
      <p>The implementation in products 4 and 5 of the
Privacy Policy function allows you to store data
only as long as it is necessary to provide the
service or allow users to control their data.
Таble 1
Security functions of educational process support systems
5</p>
      <p>Khan
Academy</p>
      <p>+
HTTPS
+
+
+
+
Educational process support systems (LMS)</p>
      <p>2 3 4
Blackboard Canvas ClGasosorgoloem</p>
      <p>+ + +
SSL/TLS</p>
      <p>HTTPS</p>
      <p>SSL/TLS
Security functions of systems</p>
      <p>User authentication
Access control/management
Event monitoring, log keeping</p>
      <p>Data encryption
Personal information privacy</p>
      <p>policy
Backup copying</p>
      <p>Security
testing/auditing/updating</p>
      <p>Strong password policy
Moodle
1
+
+
+
+
+
+</p>
      <p>The “Backup copying” function, provided in
products 1 and 2, forms the basis for ensuring the
stable functioning of the LMS and the possibility
of restoring its operation in the event of the
implementation of threats that can lead to the
destruction of critical information resources.</p>
      <p>All analyzed LMSs have built-in “Security
Testing/Audit/Update” functions in a certain way,
which should be considered a positive factor in
terms of responding to possible dangerous
changes in the surrounding environment.</p>
      <p>
        Based on the conducted analysis, it is possible
to claim that among the considered LMSs, product
1 has the best functionality from the point of view
of ensuring the confidentiality and availability of
information resources, as well as the observation
of processes. It is easy to see that this functionality
meets the minimum security requirements defined
in [
        <xref ref-type="bibr" rid="ref30">28</xref>
        ].
      </p>
      <p>At the same time, none of the above-mentioned
systems provides functions and mechanisms for
checking the integrity and authenticity of
resources as well as their authorship.</p>
      <p>
        Note that the concept of Zero Trust applies to
all participants in information exchange,
therefore, based on the ontological model of the
educational process proposed in [
        <xref ref-type="bibr" rid="ref13">11</xref>
        ], it is possible
to define the following roles in DLS, which differ
in the scope of functional tasks and, accordingly,
access rights to information resources.
      </p>
      <p>The role of “security manager” (denoted by M)
involves granting them the authority to manage
tools, measures, and parameters for the
information security of the DLS. This role does
not involve access to documents and materials of
the learning environment for their modification.</p>
      <p>The roles of the officials of the dean’s office of
the educational institution (denoted by D) require
to be given to them the authority in the system to
approve plans, programs, class schedules, and
information on the results of the final events as
well as implement control over the progress and
results of the educational process. The specified
RSA/D-H
+
+
roles provide access for modification of the
relevant resources and fixation based on the
results of measures to control the current state of
information resources, including accounting logs.</p>
      <p>The role of “teacher” (denoted by P) involves
the direct implementation of the educational
process, including the development of drafts of
programs and plans of the educational discipline,
the formation of educational and methodological
support, conducting lectures, seminars, practical
and laboratory classes, tests, keeping records of
attendance at these classes and evaluating students
based on their results, final control, etc. The role
of P requires, in particular, to give them access to
the instructional documents of the educational
institution for “reading” and the approved
Educational Methodical Support (EMS) for the
educational discipline he or she teaches, to “form
and edit” drafts of the EMS documents (before
their approval).</p>
      <p>“Student” roles (denoted as S1 … SK) require
access to the resources of the EMS of the
educational discipline and the authority to
download reporting materials based on the results
of training to record their status and integrity and
to confirm authorship. Each reporting resource
must be certified by the teacher as a fact: “the
document as it is at the current time.” The change
of reporting documents of the type “modular
control work” must be approved by the role
“dean’s office” (D).</p>
      <p>Potentially, regarding the information
resources of the educational environment
I1, I2, …, IK, which are owned (or created) by
certain participants of the educational process and
require the protection of confidentiality, integrity,
or availability, the following operations can be
implemented:
• Fr is a forgery—actions of some of the
participants in the educational process aimed at
misleading another participant by creating a
fictitious information resource.
• Md is modification—unauthorized
actions of some of the participants in the
educational process aimed at changing the real
state of the information resource or its
parameters (for example, the time and date of
creation, identifier of the author of the
resource, etc.).
• Ms is masking—the actions of some of
the participants in the educational process,
aimed at misleading another participant and
implemented by bypassing the access control
system in the DLS or by using real personal
identification and authentication parameters
(for example, login and password) of a third
participant.
• Rj is a refusal to receive a certain resource
or document placed or created by another
participant in the educational process in the
educational environment within the time and
space frameworks determined by the
regulation of the system by the established
powers (for example, failure to confirm the
fact of receiving the completed task within the
specified time limit).</p>
      <p>It remains to define the last side of the threat
model—the violator of information security (let’s
denote them as HC), who can act independently or
in collusion with some participant in the
educational process for unauthorized access to
information resources I1, I2, …, IN—digital
educational environment DLE and can potentially
implement any kind of illegal operation(All).</p>
      <p>Taking into account the assumptions made, a
model of threats to the security of DLS was
formed based on the concept of Zero Trust
(Fig. 1).</p>
      <p>In the given model, it seems appropriate to
assume that only the following roles can
potentially “act in a coalition” (collusion),
namely: certain Si and HC, or Si and Sj, or Si and
T, or Si and D.</p>
      <p>To avoid disagreements or uncertainty in
security policy, it is further assumed that the role
of security management does not involve
coalitions, nor is a coalition of three participants
in the educational process possible.
3. Practical Aspects of Building the</p>
      <p>Information Security Policy of the
Distance Learning System based on
the Concept of Zero Trust</p>
      <p>
        The following were selected as the initial data
for the formation of the Information Security
Policy of the DLS:
• The provision of the law defines a safe
educational environment as a set of conditions
in an educational institution that make it
impossible to cause harm to the PEP, in
particular as a result of non-compliance with
the requirements of the legislation on cyber
security or personal data protection [3], as well
as academic integrity as a set of ethical
principles and rules that have to be guided by
the PEP during training, teaching and carrying
out scientific activities to ensure trust in the
results of learning achievements [4].
• Requirements of standards and regulatory
documents on information protection
[
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20 ref30">14–18, 28</xref>
        ].
      </p>
      <p>Based on these data, using the constructed
model of threats to the digital educational
environment, the following basic principles of the
Information Security Policy of DLS were
formulated:
• Awareness is the participants of the
educational process should be informed in
detail about the established procedure and
conditions for the protection of information
resources in the digital educational
environment and about their obligation to
comply with information security norms.
• Responsibility is the participants are
responsible for their actions that negatively
affect information security (information
dishonesty).
• The response is the participants in the
educational process act together to prevent,
identify and respond to incidents in the
information security system of the digital
educational environment promptly.</p>
      <p>A detailed definition of a partial response
policy to incidents in the system is of special
importance for the Information Security Policy of
the DLS, which corresponds to the principles of
the concept of Zero Trust. At the same time, a
detailed incident response plan should be
developed, which defines the areas of
responsibility of the PEP and their tasks,
recommendations regarding the sequence and
content of the actions of officials in the event of a
security incident and its investigation, proposals
for measures to reduce the negative impact of
incidents on the educational process and prevent
their occurrence in the future (implementation of
countermeasures).</p>
      <p>
        Taking into account the recommendations of
security standards [
        <xref ref-type="bibr" rid="ref20">18</xref>
        ], it is considered
appropriate to include the following sections in
the typical partial policy of response to
information security incidents of DSL:
1. Formation of an incident response team
(IRT):
• Determination of the goals and tasks of
IRT actions, distribution of responsibilities
among group members, in particular, the tasks
of the manager, experts in information
technologies, cyber security, communications,
educational and methodological, and legal
issues.
• Development of a communication plan
that defines the channels of prompt delivery of
information to the PEP and receiving
feedback, the procedure for the interaction of
IRT members with DLS administrators, and
security management during the investigation
of incidents.
• Defining and clarifying the procedures for
informing the management of the educational
institution and the PEP about incidents and
regularly updating the status of incidents that
have occurred. This information has an
important aspect of professional ethics:
premature information about the progress of
the investigation, which allows identification
of the participants in the incident, can harm
both the conduct of the investigation and the
reputation of the relevant PEP.
2. Identifying and documenting potential
incidents:
• Creation of a list of potential DLS
incidents. This list should include both cyber
security incidents and other types of incidents
that may affect the security status of the
system, including natural disasters and
technical failures.
• Assessment of the probability of
occurrence of each incident and their possible
consequences.
• Determination of the scale (levels) of
incident danger and classification of incidents
based on the created scale. This measure
should help the IRT to prioritize the handling
of incidents and accordingly allocate resources
to investigate and deal with the consequences.
      </p>
      <p>Development
of
incidents, which may include activities of
surveying
the</p>
      <p>PFP, studying
documents,
copying information on media, viewing
email, etc.
3. Formation of response procedures:</p>
      <p>Determination of response tools, which
may include localization</p>
      <p>of the incident,
temporary blocking of individual resources
and/or users, adjustment of resource access
policies,
unplanned
change
of
security
parameters, etc. These tools are applied at
certain steps of the response procedures.</p>
      <p>Development of a basic set of response
procedures to be followed by the IRT for each
level of incident complexity.</p>
      <p>Development of a list of measures/a plan
to contain the incident and restore the initial
state of the system. This plan identifies specific
steps to prevent the incident from spreading
and restore the system to a stable operation.</p>
      <sec id="sec-1-1">
        <title>Determination</title>
        <p>of the
procedures for
checking the effectiveness of the incident
localization plan and restoring the initial state.
4. Conclusions, testing, and improvement:</p>
        <p>Adjustment of the basic policy based on
the findings of the incident investigation.</p>
        <p>Conducting regular training to keep IRT
skills up-to-date.</p>
        <p>Regular testing of the incident response
plan to ensure its relevance and effectiveness.</p>
        <p>By its very nature, an information security
incident response</p>
        <p>plan should be a guiding
document that is regularly updated to reflect new
threats and changes in DLS security.</p>
        <p>To a large extent, the effectiveness of the
implementation of security measures, provided
for in the information security policy of the DLS,
depends on the reliability and sufficiency of the
mechanisms used to protect the
educational
environment, so it seems appropriate to pay
attention to the specifics of their implementation
by the concept of Zero Trust.
4. The Architecture and Protection
Mechanisms of DLS based on the</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Concept of Zero Trust</title>
      <p>As it was noted, the mechanisms for ensuring
the confidentiality and availability of information
are
implemented
in
common
learning
management systems. At the same time, the issues
of ensuring integrity remain open. That is why it
seems
appropriate
to
pay
attention to the
requirements for minimizing the risks of illegal
transactions in the initial environment Fr, Rj, Md,
Ms.</p>
      <p>
        A logical preventive measure to reduce the risk
of data forgery operations Fr, refusal to create or
receive Rj, or modification Md of an information
resource created by another participant in the
educational process, in conditions of Zero Trust
can be the implementation of a parallel structure
of a
digital
collective
signature
based
on
asymmetric cryptography [
        <xref ref-type="bibr" rid="ref31">29</xref>
        ].
      </p>
      <p>The main disadvantage of this approach is the
need for significant financial expenses of the
educational institution to create and maintain the
functioning
of
its
own
secure
open-key
certification center or to obtain relevant services
from an accredited center. It should also be taken
into account that the procedures for forming and
verifying a digital signature are performed quite
slowly compared to symmetric cryptographic
transformations.</p>
      <p>
        Under
the
conditions
of the
specified
assumptions, to ensure data integrity control in the
educational digital environment, it is proposed to
implement message authentication codes using a
reliable block encryption algorithm [
        <xref ref-type="bibr" rid="ref32 ref33">30, 31</xref>
        ]. So
we have:
where:

( ) =  ℎ

(  (  ⨁ … ⨁  ( 2⨁  ( 1)))),
(1)
      </p>
      <p>( ) is a bit string of length m which
is the authentication code of the message
(information resource, data) M supplemented
with the time and date of its creation, as well
as unique identifiers of its originator and other
participants in the information exchange.
=  1 ∥  2 ∥ … ∥  
is
the
submission of the message M in the form of a
concatenation of blocks of equal length for
their
processing
(the
last
block
can
be
supplemented with a sequence of identical bits
up to the specified length of the block to be
encrypted).
using the key  .</p>
      <p>is a secure block encryption algorithm
 ℎ</p>
      <p>is the function of selecting the
first m bits from the data block.</p>
      <p>
        To prevent the coalitional falsification of
information
resources
in
the
educational
environment, it is proposed to create a joint secret
(private) key k [
        <xref ref-type="bibr" rid="ref34">32</xref>
        ] of several participants in the
educational process. At the same time, the shared
key is calculated from the private keys of three
participants in the educational process:
      </p>
      <p>{ ,  ,  } are for the case of resource control
created by the student, accepted by the teacher,
and confirmed by the dean’s office:</p>
      <p>=   ⊕   ⊕   ,
{ ,  ,  } are for the case of resource control
created by the teacher, confirmed by the dean’s
office and security management:</p>
      <p>=   ⊕   ⊕   ,
where   ,   ,   ,</p>
      <p>are private keys of the
student, teacher, dean’s office, and security
management, respectively.</p>
      <p>In the case of control of a resource created by
the student and by the dean’s office and confirmed
by the security management, which, according to
our assumption, cannot be a member of coalitions,
the private key is the result of adding the private
keys of the dean’s office and the security
management:
PEP collusion is the introduction of multifactor
authorization technology.</p>
      <p>
        In particular, one of the factors in increasing
the reliability of the identification of PEP, as well
as reducing the risk of Ms masking, could be the
introduction of electronic scorebooks, which was
proposed in [
        <xref ref-type="bibr" rid="ref35">33</xref>
        ], but at the moment the question
of
      </p>
      <p>practical developments in this direction
remains open.</p>
      <p>
        Encouraging experimental results regarding
identification were obtained in [
        <xref ref-type="bibr" rid="ref36 ref5">34</xref>
        ] based on
voice and visual biometric indicators of PEP,
while a relatively high level of probability of
correct identification  
= 0.91 was achieved.
      </p>
      <p>It should be noted that this means that, on
average, in about 10% of cases, the identification
may not be satisfactory, and a
legitimate PEP may not be identified, which
reduces the effectiveness of using this method as
the primary mechanism for identifying users of
the DLS.</p>
      <p>
        At the same time, the advantage of the method
of identifying a person by voice is the possibility
of software implementation of the corresponding
recognition algorithm [
        <xref ref-type="bibr" rid="ref37">35</xref>
        ] in the form of an
application in the environment of common
operating
systems,
which can
contribute to
ensuring the compatibility
of stationary and
mobile components of DLS. In addition, in this
case, unauthorized
access
attempts to
      </p>
      <p>DLS
resources, registered in the system event log in the
form of personal biometric information, can be
used as indisputable evidence during incident
investigations. The perspective of this approach is
also enhanced by the possibility of creating certain
random content during authentication, which can
be used to modify the parameters of identification
systems and control the integrity of resources.</p>
      <p>Another user identification
mechanism that
has proven its effectiveness, in particular, in bank
payment systems, is the confirmation of access to
the system through an additional channel, through
a smartphone
application.</p>
      <sec id="sec-2-1">
        <title>This</title>
        <p>creates
an
additional way to pass identifying information
that is difficult to track even at the Hc role level.</p>
        <p>Taking into account the above considerations,
the DLS user identification procedure will include
(5)
(6)

= 〈 1, … ,</p>
        <p>,   ∈ {̅̅0̅,̅9̅̅}, Pr(  =
 ) = 10−1, ∀ ∈ {̅̅0̅,̅9̅̅} ,  = 1,2, … ,  〉,
and invites them to read aloud. The length of the
sequence w must be sufficient to identify the user
by voice. On the other hand, to prevent brute force
attacks, the length of the sequence 
must satisfy
the inequality:
10 &gt;  
∙   ,
where</p>
        <p>—the maximum speed of sorting
through the variants of the sequence 
using the
computing equipment at the disposal of the
potential infringer,</p>
        <p>—the time limit for the
attack. In fact, (5) and (6) are the requirements for
a strong password.</p>
        <p>=   ⊕   .</p>
        <p>Ensuring the
efficient operation of the
the following steps:
authentication subsystem is a central task in the
process of creating any secure system. At the same
time, in the case of the model of Zero Trust, the
classic method of PEP authentication based on the
“login-password” pair is ineffective due to the
potential collusion of some PEPs.</p>
        <p>1. Access to the system using a personal login
and password.
3. Based on the received audio information, the
system</p>
        <p>attempts to identify the user using a
database of standards—samples of PEP voice
messages</p>
        <p>4. In the case of a positive conclusion about the
authentication of the PEP, the system informs
them about it and gives them access to the digital
learning environment (DLE) according to the
access control matrix.</p>
        <p>5. If the voice identification procedure is
completed
with
a
negative
conclusion,
a
corresponding entry is made in the event log, and
the person</p>
        <p>who applied for identification is
offered to confirm the identity by answering
questions in the mobile application, but at the
same time, some functions of the DLS for the user
may be limited.</p>
        <p>6. With the help of a secure hashing function
H, the sequence of decimal numbers 
presented
in the form of a bit string is expanded to the length
of the private key of the corresponding PEP, thus
creating a mask  =  ( ), which is used to
modify the user’s password:
the modified user password will be applied, and
this improves the security of copying the key,
which is stored on a medium such as flash
memory, in compliance with the rules that must be
defined by regulatory documents on the security
system.</p>
        <p>
          Taking into account the comments made and
the established rules of information protection in
information and communication systems [
          <xref ref-type="bibr" rid="ref30">28</xref>
          ], the
basic elements of the architecture of the distance
learning system, which works according to the
“client-server” principle and takes into account
the principles of the concept of Zero Trust, should
include the following protection
mechanisms
(Fig. 2)
 +1 = 
 ⊕  ,
 +1
(7)
is

та

respectively, user passwords in the current and
next access sessions to the
digital learning
environment. The length of the password in bits
corresponds to the length of the hash function
•
•
•
        </p>
        <p>Event Management System (EMS) is an
event management system including registration.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Integrity</title>
      </sec>
      <sec id="sec-2-3">
        <title>Control and</title>
      </sec>
      <sec id="sec-2-4">
        <title>Testing</title>
      </sec>
      <sec id="sec-2-5">
        <title>System</title>
        <p>(ICTS) is the integrity control system
and
protection system testing.</p>
      </sec>
      <sec id="sec-2-6">
        <title>Transport</title>
      </sec>
      <sec id="sec-2-7">
        <title>Layer Security (TLS 1.3) is a</title>
        <p>transport layer protection protocol.</p>
        <p>To ensure the transparency of the proposed
solution, mainly the elements corresponding to the
constructed threat model are shown in Fig. 2 not
including some other important components that
are typical for any
protection
systems, for
example, a system for creating backup copies of a
digital learning environment.
Zero Trust
are used in Fig. 2:</p>
        <p>The following abbreviations and designations</p>
        <p>Identity and Authentication Management
(IAM).
•
•
•
•
•
•</p>
      </sec>
      <sec id="sec-2-8">
        <title>Access Control System (ACS).</title>
      </sec>
      <sec id="sec-2-9">
        <title>Access Control List (ACL).</title>
      </sec>
      <sec id="sec-2-10">
        <title>AntiVirus System (AVS).</title>
        <p>A Cryptographic Protection System (CPS)
is a cryptographic
protection
system
that
provides key management, the generation of
initial passwords for new users during their
initialization, the formation of MAC codes, and
file encryption.</p>
        <p>Database of Audio References (DAR) is a
database of voice standards of DLS users.
5. Conclusions and Further Research</p>
        <p>Within the framework of the research, based
on the concept of Zero Trust a model of threats to
the DSL was developed, and practical aspects of
improving the information security policy were
determined, taking into account the requirements
of the law and the concept of Zero Trust. Also, the
mechanisms to ensure the protection of
information resources of the DSL were proposed.</p>
        <p>It seems appropriate to focus further research
on the definition of safety protocols and interfaces
of the components of the protection system and on
modeling its behavior in conditions of random
failures and failures of tools and equipment.
6. References</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Semenog</surname>
          </string-name>
          , et al.,
          <article-title>Formation of Media Educational Skills of a Future Teacher in the Professional Training</article-title>
          ,
          <source>Revista Romaneasca Pentru Educatie Multidimensionala</source>
          ,
          <volume>12</volume>
          (
          <issue>3</issue>
          ) (
          <year>2020</year>
          )
          <fpage>219</fpage>
          -
          <lpage>245</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>I. Likarchuk</surname>
          </string-name>
          ,
          <article-title>On the Organization of Distance Learning</article-title>
          . URL: https://ru.osvita.ua/blogs/71808/ On the Protection of Information in Information and Telecommunication systems, No.
          <volume>80</volume>
          /94-VR: Law of Ukraine.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>Information of the Verkhovna Rada of Ukraine</source>
          .
          <year>1994</year>
          . No.
          <volume>31</volume>
          .
          <string-name>
            <surname>Art</surname>
          </string-name>
          .
          <volume>286</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          2297-VI:
          <article-title>Law of Ukraine</article-title>
          .
          <source>Information of the Verkhovna Rada of Ukraine</source>
          ,
          <year>2010</year>
          , No.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          34,
          <string-name>
            <surname>Art</surname>
          </string-name>
          .
          <volume>481</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>On the Basic Principles of Ensuring Cyber Security of Ukraine</source>
          , No.
          <fpage>2163</fpage>
          -VIII:
          <article-title>Law of Ukraine. Verkhovna Rada information</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          2017. No.
          <volume>45</volume>
          .
          <string-name>
            <surname>Art</surname>
          </string-name>
          .
          <volume>403</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , et al.
          <article-title>Formation of requirements for the Electronic Record-Book in Guaranteed Information Systems of Distance Learning</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS 2021</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>137</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <source>Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center, in: Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things</source>
          , vol.
          <volume>3149</volume>
          (
          <year>2022</year>
          )
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Access Demarcation System Construction in Situational Center Network</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buhas</surname>
          </string-name>
          , et al.,
          <article-title>Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          (
          <year>2021</year>
          )
          <fpage>273</fpage>
          -
          <lpage>281</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sysoeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Osadcha</surname>
          </string-name>
          , Status,
          <source>Technologies and Prospects of Distance Learning in Higher Education of Ukraine. Information Technologies and Teaching Aids</source>
          ,
          <volume>70</volume>
          (
          <issue>2</issue>
          ) (
          <year>2019</year>
          )
          <fpage>271</fpage>
          -
          <lpage>284</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <article-title>Methodological Principles of Construction of Guaranteed Secure Information Systems for Distance Learning of Higher Education Institutions</article-title>
          ,
          <source>Mathematical Machines and Systems</source>
          ,
          <volume>4</volume>
          (
          <year>2020</year>
          )
          <fpage>148</fpage>
          -
          <lpage>162</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Turnbull</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chugh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Luck</surname>
          </string-name>
          ,
          <article-title>An Overview of the Common Elements of Learning Management System Policies in Higher Education Institutions</article-title>
          , Techtrends,
          <volume>66</volume>
          (
          <issue>5</issue>
          ) (
          <year>2022</year>
          )
          <fpage>855</fpage>
          -
          <lpage>867</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Adedoyin</surname>
          </string-name>
          , et al.,
          <article-title>Design and Implementation of an Online Teaching and Learning Management System</article-title>
          .
          <source>February</source>
          <year>2023</year>
          ,
          <source>FUDMA J. Sci. 7</source>
          (
          <issue>1</issue>
          ) (
          <year>2023</year>
          )
          <fpage>148</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[14] NIST Special publication 800-63 Digital Identity Guidelines. doi: 10.6028/NIST.SP.800-63-3</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [15]
          <string-name>
            <surname>DSTU</surname>
            <given-names>ISO</given-names>
          </string-name>
          /IEC 27001:
          <year>2015</year>
          ,
          <string-name>
            <given-names>Information</given-names>
            <surname>Technologies</surname>
          </string-name>
          .
          <source>Methods of Protecting the Information Security Management System. Requirements</source>
          , Technical Committee on Standardization “Information Technologies”
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [16]
          <string-name>
            <surname>DSTU</surname>
            <given-names>ISO</given-names>
          </string-name>
          /IEC TR 13335-2:
          <fpage>2003</fpage>
          ,
          <string-name>
            <given-names>Information</given-names>
            <surname>Technologies</surname>
          </string-name>
          .
          <article-title>Information Technology (IT) Security Management Guidelines. Part 2</article-title>
          .
          <string-name>
            <given-names>Security</given-names>
            <surname>Management</surname>
          </string-name>
          and Planning,
          <source>Information Technology Technical Committee on Standardization</source>
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>[17] ND TZI 3.7-003-2005</source>
          ,
          <article-title>The Procedure for Carrying Out Work on the Creation of a Comprehensive Information Protection System in the Information and Telecommunications System</article-title>
          ,
          <source>DSTSZI SB of Ukraine</source>
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Cichonski</surname>
          </string-name>
          , et al.,
          <source>Information Security Incident Response Teams: An Overview, National Institute of Standards and Technology (NIST) Special Publication 800-61, Rev. 2</source>
          ,
          <string-name>
            <given-names>Computer</given-names>
            <surname>Security Incident Handling Guide</surname>
          </string-name>
          ,
          <year>2012</year>
          . doi:
          <volume>10</volume>
          .6028/NIST.SP.
          <fpage>800</fpage>
          -
          <lpage>61r2</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Buckbee</surname>
          </string-name>
          , What Is Zero Trust?
          <article-title>Architecture and Security Guide</article-title>
          . URL: https://www.varonis.com/blog/what-iszero-trust
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <article-title>Security Policy Deploying System for Zero Trust Environment</article-title>
          ,
          <source>in book Big Data, Cloud Computing, and Data Science Engineering</source>
          ,
          <year>2023</year>
          ,
          <fpage>83</fpage>
          -
          <lpage>93</lpage>
          , doi:10.1007/978-3-
          <fpage>031</fpage>
          -19608-
          <issue>9</issue>
          _
          <fpage>7</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [21]
          <article-title>Security and Privacy</article-title>
          . URL:https://moodle.com/security-privacy/
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [22]
          <article-title>Security is top of mind for Blackboard</article-title>
          , Blackboard,
          <year>2023</year>
          . URL:https://help.black board.com/Learn/Administrator/SaaS/Secu rity#:~:text=
          <source>Blackboard%20uses%20sever al%20methods%20to,analysis%2C%20an d%20manual%20penetration%20testing.</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Our</given-names>
            <surname>Security Policies at Canvas</surname>
          </string-name>
          , Canvas,
          <year>2023</year>
          . URL:https://canvasapp.com/security
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [24] Security and
          <string-name>
            <given-names>Regulatory</given-names>
            <surname>Compliance</surname>
          </string-name>
          , Google Classroom,
          <year>2023</year>
          . URL: https://ww w.ccn-cert.cni.es/informes/abstracts/5168- google
          <article-title>-classroom-security-and-regulatorycompliance/file</article-title>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [25]
          <article-title>What are Khan Academy's security practices?</article-title>
          ,
          <source>Khan Academy</source>
          ,
          <year>2023</year>
          . URL: https://support.khanacademy.org/hc/enus/articles/4406593496077-
          <string-name>
            <surname>What-</surname>
          </string-name>
          areKhan-
          <article-title>Academy-s-security-practices-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [26]
          <string-name>
            <surname>On</surname>
            <given-names>Education</given-names>
          </string-name>
          , No.
          <fpage>2145</fpage>
          -VIII:
          <article-title>Law of Ukraine. Verkhovna Rada information</article-title>
          .
          <year>2017</year>
          . No.
          <volume>38</volume>
          -
          <fpage>39</fpage>
          . Art.
          <volume>380</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>On</given-names>
            <surname>Higher</surname>
          </string-name>
          <string-name>
            <surname>Education</surname>
          </string-name>
          , No.
          <fpage>1556</fpage>
          -VII:
          <article-title>Law of Ukraine. Verkhovna Rada information</article-title>
          .
          <year>2014</year>
          . No.
          <volume>37</volume>
          -
          <fpage>38</fpage>
          . Art.
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [28]
          <article-title>On the Approval of the Rules for Ensuring the Protection of Information in Information</article-title>
          ,
          <source>Electronic Communication and Information and Communication Systems: Decree of the Cabinet of Ministers of Ukraine dated March 29</source>
          ,
          <year>2006</year>
          , No. 373. URL: https://zakon.rada.gov.ua/laws/show/373- 2006-п#Text
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>M.</given-names>
            <surname>Burmester</surname>
          </string-name>
          , et al.,
          <string-name>
            <given-names>A Structured</given-names>
            <surname>ElGamal-Type Multisignature Scheme. Public Key</surname>
          </string-name>
          <article-title>Cryptography</article-title>
          .
          <source>PKC 2000. Lecture Notes in Computer Science</source>
          ,
          <volume>1751</volume>
          (
          <year>2000</year>
          )
          <fpage>466</fpage>
          -
          <lpage>483</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          - 46588-1_
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Korol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bosko</surname>
          </string-name>
          .
          <article-title>A Model for Generating Message Authentication Codes using Universal Hashing Functions</article-title>
          ,
          <source>Information Processing Systems</source>
          <volume>3</volume>
          (
          <issue>93</issue>
          ) (
          <year>2011</year>
          )
          <fpage>117</fpage>
          -
          <lpage>125</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>R.</given-names>
            <surname>Oliynykov</surname>
          </string-name>
          , et al.,
          <source>Results of Ukrainian National Public Cryptographic Competition, Tatra Mountains Mathematical Publications</source>
          <volume>47</volume>
          (
          <issue>1</issue>
          ) (
          <year>2009</year>
          )
          <fpage>99</fpage>
          -
          <lpage>113</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Access Demarcation System Construction in Situational Center Network, Cybersecurity Providing in Information and Telecommunication Systems (CPITSII-</article-title>
          <year>2021</year>
          ),
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , et al.,
          <source>Formation of Requirements for the Electronic RecordBook in Guaranteed Information Systems of Distance Learning, Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS'2021)</source>
          ,
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kovalyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kobets</surname>
          </string-name>
          ,
          <article-title>Multibiometric Identification of a Student based on his Voice and Visual Biometric Indicators in the Process of Distance Education</article-title>
          ,
          <source>Digital Platform: Information Technologies in the Sociocultural Sphere</source>
          <volume>5</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>90</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>O.</given-names>
            <surname>Yudin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Zyubina</surname>
          </string-name>
          ,
          <article-title>Analysis of Modern Systems and Methods of Audio Signal Recognition in Identification and Verification Tasks, Problems of informatization and management 3(59) (</article-title>
          <year>2017</year>
          )
          <fpage>75</fpage>
          -
          <lpage>79</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>