SlideShare a Scribd company logo
1 of 11
Security Audit and Mechanism of Protecting e-Learning System at the Faculty of Transport and Traffic Sciences Peraković, D., Remenar, V. Faculty of Transport and Traffic Sciences, Vukelićeva 4, 10000 Zagreb dragan.perakovic@fpz.hr, vladimir.remenar@fpz.hr IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Keynotes Analysis of FPZ LMS system application Security auditing methods Methodology of FPZ LMS system protection Preliminary protection Database protection Protection within web application Implemented LMS protection against the most common forms of attacks Conclusion Questions IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Analysis of FPZ LMS system Introduced in 2004 4800 students Times accessed: 145,000 Constant growth IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Security auditing methods Auditing techniques Four techniques Manual Static Dynamic Fuzzing Penetration auditing Web application auditing Database auditing IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Methodology of FPZ LMS system protection Preliminary protection Database protection Protection within web application IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Preliminary and database protection Information-communication logical network topology Detailed planning of computer network File checking Format, size and anti virus checking Data encryption Custom built data encryption Database protection Separate database server, firewall protected User account access levels IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Protection within web application Authorization levels Restricted access Following real system (Faculty) Seven levels Automatic logging off the system Open session problem Defined idle time  Error management Errors not visible for low level users Custom error pages IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Implemented LMS protection against most common attacks Brute force Frequent method for finding username and password Several methods for defense SQLinject Inserting SQL code into publicly accessible forms Filtering SQL specific characters and commands  Cross-site scripting, XSS Cookie theft, session and identity hijacking Filtering specific characters IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Implemented LMS protection against most common attacks Buffer overflow Inputting more data than application can process Data size checking on several levels Denial of service, DoS, DDoS Large amounts of false queries Using special tools like IDS, strange traffic detection 42.zip file Specially designed file, 42kb size, decompresses to 4PB Forbidding acceptance of exactly 42kb files, anti virus that recognizes this type of file IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Conclusion Providing reliable operation, high level of data security Constant security auditing Expand security auditing and protection for all Faculty information systems Permanent education of teaching and non-teaching staff at the Faculty IIS, Faculty of Organization and Informatics, Varaždin, 2007.
Questions? IIS, Faculty of Organization and Informatics, Varaždin, 2007.

More Related Content

Similar to Security Audit and Mechanism of Protecting e-Learning System at the Faculty of Transport and Traffic Sciences

Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 
Mobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingMobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security Training
Tonex
 
DangThomas_1PageResume_Architect
DangThomas_1PageResume_ArchitectDangThomas_1PageResume_Architect
DangThomas_1PageResume_Architect
Thomas Dang
 
external oleksandr resume 10-17-16
external oleksandr resume 10-17-16 external oleksandr resume 10-17-16
external oleksandr resume 10-17-16
Oleksandr Fidrya
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09
technext1
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
Rishu Mehra
 

Similar to Security Audit and Mechanism of Protecting e-Learning System at the Faculty of Transport and Traffic Sciences (20)

Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
HMSC_AD Event V3
HMSC_AD Event V3HMSC_AD Event V3
HMSC_AD Event V3
 
Semantic Accessibility to e-Learning Web Services
Semantic Accessibility to e-Learning Web ServicesSemantic Accessibility to e-Learning Web Services
Semantic Accessibility to e-Learning Web Services
 
Presentation made at seminar in Holland 11. january
Presentation made at seminar in Holland 11. januaryPresentation made at seminar in Holland 11. january
Presentation made at seminar in Holland 11. january
 
Securing Php
Securing PhpSecuring Php
Securing Php
 
KAWSALYA DEVARASU
KAWSALYA DEVARASUKAWSALYA DEVARASU
KAWSALYA DEVARASU
 
Mobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security TrainingMobile Security Training, Mobile Device Security Training
Mobile Security Training, Mobile Device Security Training
 
DangThomas_1PageResume_Architect
DangThomas_1PageResume_ArchitectDangThomas_1PageResume_Architect
DangThomas_1PageResume_Architect
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
external oleksandr resume 10-17-16
external oleksandr resume 10-17-16 external oleksandr resume 10-17-16
external oleksandr resume 10-17-16
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Moodle security
Moodle securityMoodle security
Moodle security
 
Basic cloud model design
Basic cloud model designBasic cloud model design
Basic cloud model design
 
First Software Security Netherlands Meet Up - Delft - 18 May 2017
First Software Security Netherlands Meet Up - Delft - 18 May 2017First Software Security Netherlands Meet Up - Delft - 18 May 2017
First Software Security Netherlands Meet Up - Delft - 18 May 2017
 
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
Management of Metadata in Linguistic Fieldwork: Experience from the ACLA Pro...
 
PHP Courses in Chandigarh
PHP Courses in ChandigarhPHP Courses in Chandigarh
PHP Courses in Chandigarh
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Security Audit and Mechanism of Protecting e-Learning System at the Faculty of Transport and Traffic Sciences

  • 1. Security Audit and Mechanism of Protecting e-Learning System at the Faculty of Transport and Traffic Sciences Peraković, D., Remenar, V. Faculty of Transport and Traffic Sciences, Vukelićeva 4, 10000 Zagreb dragan.perakovic@fpz.hr, vladimir.remenar@fpz.hr IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 2. Keynotes Analysis of FPZ LMS system application Security auditing methods Methodology of FPZ LMS system protection Preliminary protection Database protection Protection within web application Implemented LMS protection against the most common forms of attacks Conclusion Questions IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 3. Analysis of FPZ LMS system Introduced in 2004 4800 students Times accessed: 145,000 Constant growth IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 4. Security auditing methods Auditing techniques Four techniques Manual Static Dynamic Fuzzing Penetration auditing Web application auditing Database auditing IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 5. Methodology of FPZ LMS system protection Preliminary protection Database protection Protection within web application IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 6. Preliminary and database protection Information-communication logical network topology Detailed planning of computer network File checking Format, size and anti virus checking Data encryption Custom built data encryption Database protection Separate database server, firewall protected User account access levels IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 7. Protection within web application Authorization levels Restricted access Following real system (Faculty) Seven levels Automatic logging off the system Open session problem Defined idle time Error management Errors not visible for low level users Custom error pages IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 8. Implemented LMS protection against most common attacks Brute force Frequent method for finding username and password Several methods for defense SQLinject Inserting SQL code into publicly accessible forms Filtering SQL specific characters and commands Cross-site scripting, XSS Cookie theft, session and identity hijacking Filtering specific characters IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 9. Implemented LMS protection against most common attacks Buffer overflow Inputting more data than application can process Data size checking on several levels Denial of service, DoS, DDoS Large amounts of false queries Using special tools like IDS, strange traffic detection 42.zip file Specially designed file, 42kb size, decompresses to 4PB Forbidding acceptance of exactly 42kb files, anti virus that recognizes this type of file IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 10. Conclusion Providing reliable operation, high level of data security Constant security auditing Expand security auditing and protection for all Faculty information systems Permanent education of teaching and non-teaching staff at the Faculty IIS, Faculty of Organization and Informatics, Varaždin, 2007.
  • 11. Questions? IIS, Faculty of Organization and Informatics, Varaždin, 2007.