<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development of information security policy for distance education services using risk assessment method</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Orest Polotai</string-name>
          <email>orest.polotaj@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdana Polotai</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Harasymchuk</string-name>
          <email>oleh.i.harasymchuk@edu.lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andriy Ivanusa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CH&amp;CMiGIN'25: Fourth International Conference on Cyber Hygiene &amp; Conflict Management in Global Information Networks</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Stepan Bandera Str.,12, Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Lviv State University of Life Safety</institution>
          ,
          <addr-line>Kleparivska Str., 35, Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Lviv University of Trade and Economics</institution>
          ,
          <addr-line>Tugan-Baranovskogo Str., 10, Lviv, 79005</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The paper is devoted to the development of organizational measures of information security pol-icy when providing distance education services. For this purpose, the experience of organizing distance education by higher education institutions in modern conditions is analyzed. The subject of the study is the modular object-oriented dynamic e-learning system Moodle, as a popular tool for providing distance education services. The scheme of structural elements of the e-learning sys-tem Moodle is shown and the classification of methods and means of ensuring information secu-rity in an electronic course, as the main component of the e-learning system, is given. A scheme-process of management and assessment of information security risks when providing dis-tance education services is proposed. Based on it, a model of internal and external violators of in-formation security of a distance education service is built with a ranking of the level of damage of each violator, as well as a model of specific threats to information security when providing dis-tance education services. A set of rules for the information security policy of an electronic course, as an environment for providing distance education services, is proposed.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;information security</kwd>
        <kwd>distance education service</kwd>
        <kwd>e-learning</kwd>
        <kwd>e-course</kwd>
        <kwd>information security risks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Distance education services [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] are a learning system built using information and telecommunication
technologies, which are widely used by students and teachers in modern conditions. The e-learning
system [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] allows for the teaching of educational courses, receiving information and communication
between teachers and students.
      </p>
      <p>
        Distance education services are used in developed countries of the world, as they provide the following
advantages [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ]:
• Access anywhere and at any time;
• Allows the use of various and modern means and methods of learning (text, video, tests, etc.);
+
+
+
+
+
+
+
Conditionally
free
the protection of biometric data privacy, the reliability of signature generation algorithms, and
ensuring compatibility with existing electronic signature standards and Public Key Infrastructure
(PKI) [
        <xref ref-type="bibr" rid="ref6 ref7 ref8 ref9">6, 7, 8, 9</xref>
        ].
      </p>
      <p>The first e-learning institution - the Berlin Institute for the Study of Foreign Languages, was created
by foreign language teachers of the University of Berlin, Ch. Toussaint and G. Lanchensteidt in 1856.
Education there took place by correspondence, which was called "corresponding learning".</p>
      <p>At present, significant experience has already been accumulated abroad in the implementation of
systems for providing distance educational services (SPDES). In the USA, about 1 million people study
in the distance education system, for which public television is used. Canadian e-learning universities
provide training courses on tradi-tional media. Courses usually consist of printed materials and include
methodological guidelines, a selection of articles for additional education, instructions for conducting
laboratory exercises, etc. Only some universities use the capabilities of computer-based learning and
e-mail as part of the education system. The Open University of Great Britain has established itself as a
world leader in non-traditional education.</p>
      <p>Following the example of the Open University of Great Britain, educational insti-tutions of a similar
type were created in Canada, Austria, Spain, Pakistan, the Nether-lands, Turkey, India, Israel, etc.</p>
      <p>Among the most popular SPDES are the following: Moodle, Lotus Learning Space, REDCLASS,
Blackboard Learning System, GEKADEM. Distance education service de-livery systems have a common
goal – software support for the distance learning pro-cess, but they have diferent parameters and
capabilities. Table 1 shows the functions and tools that are available or not available in them.</p>
      <p>
        Moodle is the name of a program that allows anyone to master educational mate-rial remotely, using
the Internet. This program provides students with access to nu-merous electronic courses. Many
educational sites operate on the basis of the Moodle system [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12, 13</xref>
        ], which use this system as a
shell for providing distance educational ser-vices. This indicates that this type of service is developing
dynamically throughout the world. Some universities already have a well-established system for
providing distance educational services, others are just beginning to develop it. The advantage of the
Moodle platform is the fact that since 1999, it has been repeatedly modified and sup-plemented with
new solutions and tools. The platform software is written in PHP using free publicly available databases
(MySQL, PostgreSQL). The Moodle platform can be installed on any operating system (MS Windows,
Unix, Linux).
      </p>
      <p>Taking into account the above, we note that the Moodle system can be used not only to organize
the provision of distance education services in higher education in-stitutions, but also to support the
traditional educational process of higher education using a blended (combined) model.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and methods</title>
      <sec id="sec-2-1">
        <title>2.1. Location of the study</title>
        <p>The research was conducted on the basis of SPDES Lviv State University of Life Safety "Virtual
University" [14], which operates on the Moodle platform (Figure 1).</p>
        <p>SPDES, shown in Figure 1, runs on a server supported by cloud services and ad-ministered by the
Information Technology Department and the Department of Infor-mation Security Management of the
Lviv State University of Life Safety. It is worth noting that a similar system of this type operates at the
Lviv Polytechnic National University and the Lviv University of Trade and Economics, therefore all the
results of the research can be applied in these higher education institutions.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Software</title>
        <p>A stored xss cyberattack was experimentally carried out on the SPDES system under study, using an
account with the rights of a “teacher”. The cyberattack was carried out by employees of the department
where the distance education services system is maintained, in order to identify vulnerable entry points
in the Moodle system.</p>
        <p>XSS (Cross-Site Scripting) [15] is a type of web application vulnerability that allows attackers to
inject malicious JavaScript code into the page that the user is viewing. This code can be used to steal
confidential data, redirect users to phishing sites, and perform other malicious actions.</p>
        <p>The XSS vulnerability was first discovered in the late 1990s, when web applications were becoming
more widespread. Over time, such attacks have become more sophisticated, and today they remain one
of the main methods of cyberattacks. Along with the development of technologies and web standards,
such as HTML, CSS and JavaScript, methods of protection against XSS have also developed. However,
the threat remains relevant and requires constant attention and updating of protection measures. The
fragment of malicious code for carrying out a stored xss attack is based on the following Algorithm 1.</p>
        <p>Algorithm 1. Using a stored xss attack to embed malicious code into the SPDES body
c o n s o l e . l o g ( a t o b ( b t o a ( a ) ) ) ;
&lt;/ s c r i p t &gt;</p>
        <p>The result of this attack is blocking access to course materials, i.e. the property of information
accessibility - is violated, while the integrity of the materials is not violated (Figure 2).</p>
        <p>The implementation of this attack turned out to be possible through the resource or text data loading
ifeld, where you can load a bat.file with the text of algorithm 1 and run it for execution (Figure 3).</p>
        <p>It is worth noting that the implementation of such a cyberattack can only be carried out from an
account not lower than the “teacher” level. It was experimentally found that users with lower rights, such
as “student”, will not be able to implement such an attack, since the Moodle distance education service
system filters downloaded files. But on the other hand, a user at the “student” level can intercept an IP
packet with the credentials of users with higher privileges and implement such an attack. Therefore,
there is a need to investigate SPDES information security violators, the threats they can implement and
assess the risks of implementing the corresponding threats and the level of damage that may arise as a
result.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results</title>
      <p>A large number of works are devoted to issues of information security and cybersecurity in various
ifelds [ 16, 17, 18, 19]. The problem of standardization in this direction is also relevant. A large number
of works are devoted to issues of information security and cybersecurity in various fields [ 20, 21].
Information security is understood as "the state of information security in which its confidentiality,
availability and integrity are ensured" [22]. In this case:</p>
      <p>1. Confidentiality is ensuring access to information only to authorized users.
2. Integrity is ensuring the reliability and completeness of information and methods of its processing.
3. Availability is ensuring access to information to authorized users as necessary.</p>
      <p>The complex nature of the protection problem suggests that a combination of legislative,
organizational and software-technical measures is necessary to solve it.</p>
      <p>Knowledge of possible threats, as well as vulnerabilities of the information system, is necessary in
order to choose the most efective means of ensuring security.</p>
      <p>One of the most dangerous and frequent are unintentional errors of users, opera-tors, system
administrators and other persons servicing information systems. Some-times such errors lead to direct
damage (incorrectly entered data, an error in the pro-gram that caused the system to stop or collapse).
Sometimes they create weaknesses (most often due to administrative errors) that can be exploited by
attackers.</p>
      <p>Theft and falsification are in second place in terms of damage. In most cases, the culprits were
fulltime employees of organizations who were perfectly familiar with the operating mode and protective
measures.</p>
      <p>A key stage in building a reliable information system is the development of a se-curity policy [23].
There are several definitions of this concept. Here are some of them. Security policy is a set of
guiding principles, rules, procedures and practical tech-niques in the field of security that regulate the
management, protection and distribu-tion of valuable information [22, 24]. The key point of the security
policy for SPDES is the methods and means of ensuring information protection and their analysis.</p>
      <p>Graphically, this classification is presented in Figure 4.</p>
      <p>The SPDES information security policy for users with the “student” role should be available at each
educational institution and specified in the form of information security rules. Necessary measures to
protect SPDES from intentional and unintentional actions of students: administrator control,
personalization and restriction of access to critical resources, control and response to unauthorized actions of
software protection tools.</p>
      <p>The main goal of the SPDES security policy is to ensure that users with the “student” role comply
with information security rules that prevent or minimize the harm they can cause by their actions. This
goal is implemented through organizational, software, hardware, and educational measures.</p>
      <p>Organizational measures include the development, implementation, and monitoring of the
implementation of the SPDES information security system security policy for student users. Implementation
monitoring is the responsibility of the administrator.</p>
      <p>The hardware and software of the adopted security policy are implemented through a user access
management system to resources, which includes user identification and authentication, resource access
control, logging and auditing of user actions [25, 26, 27]. The hardware and software must guarantee the
protection of critical components of the SPDES software (Figure 5) from unauthorized and erroneous
user actions.</p>
      <p>In Figure 5, SPDES is considered as a scalable system that can operate on a separate computer, in
local and/or global networks in Web, GRID and cloud environments.</p>
      <p>The purpose of the computer infrastructure is to provide computing resources to support the operation
of SPDES. It includes computer hardware, system software, communication equipment and the CI
information protection system.</p>
      <p>The SPDES platform includes a set of software and hardware that form an appropriate electronic
learning environment using information resources and SPDES security policy mechanisms,
specialpurpose equipment, SPDES system and application software, and the SPDES platform information
protection system.</p>
      <p>Information resources include the main content of SPDES, including information with limited access,
such as a database with system user credentials.</p>
      <p>SPDES human resources unite all participants in the educational process who receive and provide
educational services, as well as support the functioning of SPDES. Human resources are the most critical
factor in the implementation of information security threats.</p>
      <p>Each component of the SPDES architecture has its own vulnerabilities and the threats they cause
&lt;  +    +  +  &gt;=  ℎ,
(1)
where ISTh is information security threats.</p>
      <p>To describe specific threats, we will build an information security threat model SPDES, in which we
will indicate the name of the threat, its description, and the components of the SPDES architecture
vulnerable to it (Table 2).</p>
      <p>As can be seen from the Table 2, most of the specific threats arise at the SPDES platform level. Critical
components from the point of view of information protection are administrative systems, training
repository, assessment system, communication module.</p>
      <p>Description
An attacker can gain unauthorized
access to the system and upload
fake content if SPDES has vulnerabilities
in identification, authentication,
and authorization mechanisms</p>
      <p>An attacker can gain unauthorized
access to the system and view uploaded
exams before the exam date if SPDES has
vulnerabilities in identification, authentication,
authorization, and confidentiality mechanisms</p>
      <p>An attacker can gain unauthorized</p>
      <p>ccess to the system and delete
downloaded exam files if SPDES has
vulnerabilities in identification, authentication,
authorization, integrity, and availability</p>
      <p>mechanisms</p>
      <p>A student may knowingly disclose their
identification and authentication data to an
unauthorized person who may take the</p>
      <p>exam instead of the student</p>
      <p>An attacker can gain unauthorized
ccess to the system and change the exam
date if the SPDES has vulnerabilities</p>
      <p>in the integrity mechanism</p>
      <p>An attacker can gain unauthorized access
to the system, intercept other students’ results,
and present them as their own work</p>
      <p>An attacker can use "holes" in the
PDES security system for unauthorized
access to educational content that
the does not have the right to access
An attacker, using system vulnerabilities,
embeds malicious code into the system
code structure and thus blocks the system
from working</p>
      <p>Vulnerable
component
Administrative</p>
      <p>System,
Authoring System</p>
      <p>Administrative
system,
Learning</p>
      <p>Repository
Administrative
system,
Learning
Repository
Evaluation</p>
      <p>system
Administrative</p>
      <p>system,
assessment</p>
      <p>system
Communication</p>
      <p>module,
assessment system</p>
      <p>Administrative
system,
learning
repository</p>
      <p>IR</p>
      <p>IR
administrative</p>
      <p>system,
learning
repository</p>
      <p>What does
it afect?
Integrity
Privacy</p>
      <p>Integrity,
accessibility</p>
      <p>Reliability,
confidentiality
Accessibility,
reliability</p>
      <p>Privacy
Confidentiality,
integrity,
availability</p>
      <p>Accessibility
Confidentiality,</p>
      <p>privacy,
accessibility</p>
      <p>Let us consider in more detail human resources HR, among which there may be potential attackers
violators of SPDES information security.</p>
      <p>A violator is a person who, by mistake, due to ignorance, purposefully, with malicious intent or
without it, using various capabilities, methods and means, attempted to perform operations that led to
or may lead to a violation of the properties of information defined by the security policy [26].</p>
      <p>The goal of the intruder may be:
• Obtaining the necessary information in the required volume;
• Being able to make changes to information flows in accordance with their intentions;
• Causing damage by destroying material and information values.</p>
      <p>Violators are divided into two main groups: external and internal. Among internal intruders, the
following can be distinguished:
• system users;
• personnel servicing technical equipment;
• employees of software development and maintenance departments;
• security service employees;
• managers of various levels and job hierarchy.</p>
      <p>Among external intruders, the following can be distinguished:
• clients (representatives of organizations, citizens);
• visitors (invited for any reason);
• hackers;
• persons who accidentally or intentionally violated the access regime (without the purpose of
violating security);
• any persons outside the controlled area.</p>
      <p>Each ofender can be described by a model using certain indicators, which together form a detailed
description of him with the level of threats he can implement</p>
      <p>ISB SPDES =  +  +  +  +  → ,
(2)
where ISB - Information security breacher; M – motive; Q – qualification; O – opportunities; T – time;
P – place; L - losses.</p>
      <p>To minimize and prevent negative actions, it is proposed to introduce the SPDES information security
risk assessment process model (Figure 6).</p>
      <p>Let’s consider in more detail the SPDES information security threat identification model-scheme
(Figure 7).</p>
      <p>All SPDES information security threats and violators acting as their sources should be analyzed by an
expert group using the brainstorming method. The result of the expert group’s actions is the creation
of a database of information security threats.</p>
      <p>Similarly, we will present a model-scheme for determining the level of damage L when carrying out
an attack by the SPDES information security violators described above (Figure 8).</p>
      <p>The determination of the level of damage L when carrying out an attack by the above-described
SPDES information security violators is also carried out by an expert group using the brainstorming
method. In this case, the expert group must include specialists in the field of distance education services.</p>
      <p>So, in summary, we can ofer a generalized scheme for establishing the values of information security
risks in the provision of distance education services using SPDES (Figure 9).</p>
      <p>Let’s consider each component of the ISB model. The model of the ofender by the motive of the
ofender is shown in Table 3. Four main motives for violations can be distinguished:
• irresponsibility (losses – 1);
• self-assertion (losses – 2);
• self-interest (losses – 3);
• professional duty (losses – 4).</p>
      <p>In the case of irresponsible violations, the user intentionally or accidentally performs destructive
actions that are not associated with malicious intent. In most cases, this is a consequence of incompetence
or negligence. Some users consider gaining access to system data sets to be a significant success, starting
a kind of game for the sake of self-afirmation either in their own eyes or in the eyes of colleagues
[27, 28, 29].</p>
      <p>A SPDES security breach can be caused by the self-interest of the SPDES user. In this case, he will
purposefully try to overcome the protection system for unauthorized access to information in SPDES.</p>
      <p>The level of threats is an assessment of the possible damage that an attacker can cause, provided
that the appropriate characteristics are present. The level of damage is characterized by the following
categories: 1 - insignificant; 2 - acceptable; 3 - average; 4 - very significant.</p>
      <p>The model of the attacker by qualification features is shown in Table 4.</p>
      <p>All attackers can be classified by the level of awareness:</p>
      <p>• knows the functional features of SPDES, the main patterns of forming data arrays and streams of</p>
      <p>requests to them in it, knows how to use standard tools; losses - 1;
• has a high level of knowledge and experience in working with the technical means of the system
and their maintenance; losses - 2;
• has a high level of knowledge in the efild of programming and computing, design and operation
of automated information systems; losses - 2;
• knows the structure, functions and mechanism of action of protection tools, their strengths and
weaknesses; losses - 3.</p>
      <p>The model of the ofender by capabilities is shown in Table 5. By the level of capabilities, methods
and means used:
• uses only agent methods of obtaining information; losses – 1;
• uses passive means (technical means of interception without modification of system components);
losses – 2;
• uses only standard means and shortcomings of the protection system to overcome it (unauthorized
actions using permitted means), as well as compact magnetic media that can be secretly carried
through security posts; losses – 3;
• uses methods and means of active influence (modification and connection of additional technical
means, connection to data transmission channels, implementation of software bookmarks and
use of special instrumental and technological programs); losses – 3.</p>
      <p>The model of the attacker by the time of action is shown in Table 6.</p>
      <p>By the time of action, the attackers are classified by the time when they can carry out their attack:
• during the operation process (during the operation of the SPDES components); losses – 3;
• during the period of inactivity of the system (during non-working hours, during planned breaks
in its operation, breaks for maintenance and repairs, etc.); losses – 2;
• both during the operation process and during the period of inactivity of SPDES; losses – 4.
M2, M3
M2, M3
M2, M3</p>
      <p>Q
Q1, Q4
Q1, Q4
Q1, Q4
Q1, Q4</p>
      <p>Q1, Q4
Q1, Q4</p>
      <p>Q2, Q3
Q2, Q3, Q4</p>
      <p>Q2, Q3
Q1, Q2, Q4 1+2+3=6</p>
      <p>Q1, Q2, Q3, Q4 1+2+2+3=8
Q1, Q2, Q3, Q4 1+2+2+3=8
2+3=5
2+3=5
2+3=5</p>
      <p>L
1+3=4
1+3=4
1+3=4
1+3=4
1+3=4
1+3=4
2+2=4
2+2+3=7
2+2=4</p>
      <p>T
T2
T2</p>
      <p>T2
O1, O2</p>
      <p>O1, O4
O1, O2, O4
1+2=3
1+3=4
1+2+3=6</p>
      <p>T1
T1, T2, T3</p>
      <p>3
3+2+4=9
T1, T2, T3</p>
      <p>3+2+4=9
T1
T1
T1</p>
      <p>T1
T1, T2, T3
3
3
3
3
3+2+4=9
T1, T2, T3
3+2+4=9
3+3=6
3+3=6</p>
      <p>L
3
L
The model of the intruder by location is shown in Table 7.</p>
      <p>By time of action, intruders are classified by location from which they can carry out their attack:
• without access to the controlled territory of the organization; losses – 1;
• from the controlled territory without access to buildings and structures; losses – 1;
• inside the premises, but without access to technical means; losses – 2;
• from the workplaces of end users (operators); losses – 2;
• with access to the data zone (databases, archives, etc.); losses – 3;
• with access to the security management zone; losses – 4.</p>
      <p>Table 8 shows the aggregated model of the ofender.</p>
      <p>Figure 10 shows a diagram of SPDES information security violators in terms of the damage they can
cause.</p>
      <p>Therefore, the main source of SPDES information security breaches is within the information systems
themselves, so internal protection should be mandatory for any of them. Table 9 shows the ranking of
information security threats risks when providing distance education services using SPDES.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Discussions</title>
      <p>For reliable and secure work with SPDES and the electronic course, which is one of its key elements, it
is necessary to adhere to the main login measures of the information security policy:
1. Administrator and teacher users must have a password for their account that meets the password
format requirement as per the password policy.</p>
      <p>2. Users such as a student, guest, and authenticated user must have a minimum set of rights to work
with the electronic course, that is, the course must be configured in this way.</p>
      <p>3. When creating each electronic course in SPDES, it is necessary to configure rights to work with
each of its elements.</p>
      <p>4. After creating an electronic course, it is imperative to create a backup copy of it.
5. After creating an electronic course, it is necessary to configure the features of user registration for
it and be sure to disable the possibility of self-registration for the course.</p>
      <p>6. When working with an electronic course in SPDES, the user’s personal computer must have
activated and updated antivirus software that will protect against unwanted viruses that can damage
part of the electronic course.</p>
      <p>7. After the end of the training period on the electronic course, the teacher must clear it of old
statistics, reports, delete all completed tasks, and exclude all former users from the course.</p>
      <p>8. After cleaning the course, it must be hidden and students must be denied access to it.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Ensuring information security is one of the most important tasks of organizations in providing distance
education services. Speaking about information as a resource of management systems, it can be noted
that ensuring its security requires a comprehensive approach that will allow to comprehensively ensure,
ifrstly, integrity, secondly, accessibility, thirdly, confidentiality. The diversity and wide application
of SPDES in various spheres of human activity, as well as their dependence on the security of the
information resource, enhance the significance and relevance of the SPDES study.</p>
      <p>The relevance of the issue of information security of such systems is due to the problems of
ensuring integrity, accessibility and confidentiality in parallel with the is-sues of ensuring compatibility,
extensibility and scalability of these systems.</p>
      <p>It should also be noted that there are commercial and open-source systems. The information security
settings of such systems difer somewhat for obvious reasons, but the key points of their administration
are the same.</p>
      <p>The advantages of commercial software are widely known: for the most part, these are reliable
products (especially those that have taken root in the market), with an appropriate level of user support,
regular upgrades and new versions.</p>
      <p>However, there are also disadvantages. For example, there is a problem of "closed doors" when using
systems for providing distance education services on closed plat-forms. First, the source code is not
available to the organization’s technical support, so even small changes at the user level are not possible.
The organization can try to con-tact the manufacturing company if it has suggestions for improvement,
but it is very unlikely that its ideas will be implemented in a short period of time, if at all. In addi-tion,
the disadvantages include the high cost of any commercial product, regular pay-ments for a license, for
increasing the number of users (which is actually a mandatory factor of any network system), and so
on.</p>
      <p>Open-source systems allow you to solve the same tasks as commercial systems, but at the same
time users have the opportunity to refine and adapt a particular sys-tem to their needs and the current
educational situation. Most open-source systems are cross-platform solutions and are not tied to specific
operating systems or specific Web browsers.</p>
      <p>Current trends in the development of OpenSource LCMS are directed towards universalization and
increasing the functionality of systems. In terms of their capabili-ties, the most advanced systems are
not inferior to commercial analogues, and some even surpass them.</p>
      <p>Open-source SPDES allow you to implement the same set of functional capabili-ties as commercial
solutions, but with significantly lower economic costs.</p>
      <p>Therefore, the analysis and application of SPDES security tools is a priority task for achieving the
maximum level of security. These include, in particular, SPDES ad-ministration tools. With their
help, thanks to a flexible system of settings, it is possible to ensure maximum privacy for users and
confidentiality of information stored in the educational database of the system. To configure the entire
system, there is an admin-istrator (in the case of course settings, his role can be performed by a teacher),
who needs to:</p>
      <p>1. Create accounts and assign them roles. Here you can register, delete and edit ac-counts of system
users. There is also a form in which the personal data of this user, his blog, full activity reports, his
messages are stored. In the settings, you can assign a role to a user (A role is a set of rights (permissions)
defined for the site as a whole, which can be assigned to specific users in a given context).</p>
      <p>2. Configure the course. This means the ability to both create a new course and use an existing one,
in other words, there is a function of cloning courses and settings. As well as control user access to the
system’s educational resources.</p>
      <p>3. Fill the course with educational materials. The system has a wide variety of mod-ules (course
elements) that can be used to create courses of any type. Depending on the content of the course and
the teaching concept, the administrator includes the most suitable elements and resources provided by
the system.</p>
      <p>4. Administer the learning process. In particular, this function includes timely up-dating and/or
deleting accounts, checking the relevance of data (information about users, educational materials) stored
in the system. Changing access rights and reas-signing roles for participants in the learning process.</p>
      <p>Thus, the administrator is a user with the broadest rights, the main purpose of which is to maintain
stable system operation, user management, setting the main system parameters, information security
of the course and personal data of users, backups and much more. It is from his thoughtful and, as a
result, efective work that the work of the entire SPDES will depend on.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[13] V. Tkachuk, Y. Yechkalo, S. Semerikov, M. Kislova, Y. Hladyr, Using mobile ICT for online learning
during COVID-19 lockdown, in: Communications in Computer and Information Science, volume
1308, Springer, 2021, pp. 46–67. doi:10.1007/978-3-030-77592-6_3.
[14] Electronic learning system of the Lviv State University of Life Safety "Virtual university", 2025.</p>
      <p>URL: https://virt.ldubgd.edu.ua/, accessed: 2025-07-29.
[15] D. Lu, L. Liu, Research on cross-site scripting attack detection technology based on few-shot
learning, in: 2023 IEEE 6th Information Technology, Networking, Electronic and Automation
Control Conference (ITNEC), Chongqing, China, 2023, pp. 1425–1429. doi:10.1109/ITNEC56291.
2023.10082596.
[16] Y. Martseniuk, et al., Universal centralized secret data management for automated public cloud
provisioning, in: Cybersecurity Providing in Information and Telecommunication Systems II, 2024,
pp. 72–81.
[17] D. Shevchuk, O. Harasymchuk, A. Partyka, N. Korshun, Designing secured services for
authentication, authorization, and accounting of users, in: Cybersecurity Providing in Information and
Telecommunication Systems II, 2023, pp. 217–225.
[18] Y. Martseniuk, et al., Shadow IT risk analysis in public cloud infrastructure, in: Cyber Security
and Data Protection, 2024, pp. 22–31.
[19] A. Al-Mufairej, L. BinGhaith, D. AlShareef, N. S. M. Jamail, Cyber security risk management:
Elearning system, in: 2022 Fifth International Conference of Women in Data Science at Prince Sultan
University (WiDS PSU), Riyadh, Saudi Arabia, 2022, pp. 146–149. doi:10.1109/WiDS-PSU54548.
2022.00041.
[20] O. Deineka, O. Harasymchuk, A. Partyka, A. Obshta, N. Korshun, Designing data classification
and secure store policy according to SOC 2 type II, in: CEUR Workshop Proceedings, volume 3654,
2024, pp. 398–409.
[21] O. Deineka, et al., Information classification framework according to SOC 2 type II, in:
Cybersecurity Providing in Information and Telecommunication Systems II, 2024, pp. 182–189.
[22] The oficial site of the LON-CAPA system, 2025. URL: http://www.loncapa.org, accessed:
2025-0729.
[23] R. Setiawan, et al., E-learning pricing model policy for higher education, IEEE Access 11 (2023)
38370–38384. doi:10.1109/ACCESS.2023.3266954.
[24] J. Yong, J. Li, H. Wang, Portable devices of security and privacy preservation for e-learning, in:
2008 12th International Conference on Computer Supported Cooperative Work in Design, Xi’an,
China, 2008, pp. 1029–1034. doi:10.1109/CSCWD.2008.4537121.
[25] Y. Martseniuk, A. Partyka, O. Harasymchuk, N. Korshun, Automated conformity verification
concept for cloud security, in: CEUR Workshop Proceedings, volume 3654, 2024, pp. 25–37.
[26] C. M. A. Irfan, S. Nomura, K. Ouzzane, Y. Fukumura, Face-based access control and invigilation tool
for e-learning systems, in: 2009 International Conference on Biometrics and Kansei Engineering,
Cieszyn, Poland, 2009, pp. 40–44. doi:10.1109/ICBAKE.2009.43.
[27] P. Saxena, H. Sanyal, R. Agrawal, Application of rules and authorization key for secured online
training — A survey, in: Proceedings of International Conference on Sustainable Expert Systems,
volume 176, 2021, p. 41.
[28] O. O. Budik, V. F. Chekurin, Specific threats to information security of e-learning systems, Bulletin
of the Lviv Polytechnic National University. Automation, Measurement and Control (2012). URL:
http://science.lp.edu.ua/uk/node/2044.
[29] O. I. Polotai, N. P. Kuharska, Development of electronic courses in a virtual learning environment,
SPOLOM, Lviv, 2021.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>W.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. A. M.</surname>
          </string-name>
          <article-title>do Amaral, Distance education as a service system</article-title>
          ,
          <source>in: 2019 IEEE World Conference on Engineering Education (EDUNINE)</source>
          , Lima, Peru,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ EDUNINE.
          <year>2019</year>
          .
          <volume>8875822</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Thakkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. D.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <article-title>E-learning systems: A review</article-title>
          ,
          <source>in: 2015 IEEE Seventh International Conference on Technology for Education (T4E)</source>
          , Warangal, India,
          <year>2015</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .1109/ T4E.
          <year>2015</year>
          .
          <volume>6</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Samsari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Palaiologou</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Nikolaou,</surname>
          </string-name>
          <article-title>The impact of the COVID-19 pandemic in the inclusion of refugee students in Greek schools: Pre-service teachers' views about distance learning</article-title>
          ,
          <source>Societies</source>
          <volume>14</volume>
          (
          <year>2024</year>
          )
          <article-title>60</article-title>
          . doi:
          <volume>10</volume>
          .3390/soc14050060.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Selim</surname>
          </string-name>
          ,
          <article-title>Distance learning and its efectiveness in improving literacy, education and skills development for remote population and for overcoming the challenges of COVID 19</article-title>
          , in: 2020 Sixth International Conference on e-
          <source>Learning (econf)</source>
          , Sakheer, Bahrain,
          <year>2020</year>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>71</lpage>
          . doi:
          <volume>10</volume>
          . 1109/econf51404.
          <year>2020</year>
          .
          <volume>9385522</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Wang-Peng</surname>
          </string-name>
          ,
          <article-title>Distance education service system in western underdeveloped regions</article-title>
          , in: 2010 International Conference on Optics, Photonics and Energy
          <string-name>
            <surname>Engineering</surname>
          </string-name>
          (OPEE), Wuhan, China,
          <year>2010</year>
          , pp.
          <fpage>184</fpage>
          -
          <lpage>186</lpage>
          . doi:
          <volume>10</volume>
          .1109/OPEE.
          <year>2010</year>
          .
          <volume>5508060</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.-J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Cai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Evaluating the quality of distance education services by using modern information technology</article-title>
          ,
          <source>in: 2012 IEEE Asia-Pacific Services Computing Conference</source>
          , Guilin, China,
          <year>2012</year>
          , pp.
          <fpage>192</fpage>
          -
          <lpage>199</lpage>
          . doi:
          <volume>10</volume>
          .1109/APSCC.
          <year>2012</year>
          .
          <volume>50</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Tunay</surname>
          </string-name>
          ,
          <article-title>A new approach model of e-visual career application in distance education</article-title>
          ,
          <source>in: 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Vyshnivskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Hnidenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. I.</given-names>
            <surname>Haydur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Ilyin</surname>
          </string-name>
          ,
          <article-title>Organization of distance education. Creation of electronic training courses and electronic tests</article-title>
          .
          <source>Study guide, DUT</source>
          , Kyiv,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Popov</surname>
          </string-name>
          , et al.,
          <article-title>Immersive technology for training and professional development of nuclear power plants personnel</article-title>
          ,
          <source>in: Proceedings of the CEUR Workshop</source>
          , volume
          <volume>2898</volume>
          , CEUR-WS.org,
          <year>2021</year>
          , pp.
          <fpage>230</fpage>
          -
          <lpage>254</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L. L.</given-names>
            <surname>Salekhova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Grigorieva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Zinnurov</surname>
          </string-name>
          ,
          <article-title>Using LMS moodle in teaching CLIL: A case study</article-title>
          ,
          <source>in: 2019 12th International Conference on Developments in eSystems Engineering (DeSE)</source>
          , Kazan, Russia,
          <year>2019</year>
          , pp.
          <fpage>393</fpage>
          -
          <lpage>395</lpage>
          . doi:
          <volume>10</volume>
          .1109/DeSE.
          <year>2019</year>
          .
          <volume>00078</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Y.-C. Chang</surname>
            ,
            <given-names>J.-W.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>D.-Y.</given-names>
          </string-name>
          <string-name>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>A personalized learning service compatible with moodle e-learning management system</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>12</volume>
          (
          <year>2022</year>
          )
          <article-title>3562</article-title>
          . doi:
          <volume>10</volume>
          .3390/app12073562.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Gamage</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Ayres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. B.</given-names>
            <surname>Behrend</surname>
          </string-name>
          ,
          <article-title>A systematic review on trends in using moodle for teaching and learning</article-title>
          ,
          <source>International Journal of STEM Education</source>
          <volume>9</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>