26
Panita Wannapiroon, Ph.D. Assistant Professor Preecha Pangsuban Ph.D. Candidate Prachyanun Nilsook, Ph.D. Associate Professor Division of Information and Communication Technology for Education, Faculty of Technical Education, King Mongkut's University of Technology North Bangkok, Thailand. Systems Analysis of Risk Assessment for Moodle Learning in a LAMP Environment from Log Files 1

Systems Analysis of Risk Assessment for Moodle Learning in a LAMP Environment from Log Files

Embed Size (px)

Citation preview

Page 1: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

Panita Wannapiroon, Ph.D. Assistant Professor

Preecha Pangsuban Ph.D. Candidate

Prachyanun Nilsook, Ph.D. Associate Professor

Division of Information and Communication Technology for Education, Faculty of Technical Education, King Mongkut's University of Technology North Bangkok, Thailand.

Systems Analysis of Risk Assessment

for Moodle Learning

in a LAMP Environment from Log Files

1

Page 2: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

INTRODUCTION

•Moodle is the most popular open source e-Learning.

•It has higher capabilities of learner tools, support tools and

technical specifications tools than the other softwares.

•Many researches showed that the Moodle not without risk.

•Moodle had higher number of vulnerabilities compared to its commercial (Joh, 2013).

•Unfortunately, it has not been systematically tested for vulnerabilities and weaknesses (Martinez et al., 2013).

2

Page 3: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

INTRODUCTION (2)

•Commonly, Log file is used primarily for troubleshooting problems.

•Log file contains information related to many different types of events occurring within networks and systems (Kent, K., 2006).

•Log file analysis is statistical algorithms to determine incident severity and then assigns a threat score based on asset value.

•The risk assessment of Moodle was evaluated by log file analysis approach.

3

Page 4: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

INTRODUCTION (3)

•The ISO/IEC27005:2011 is chosen in order to achieve the best risk assessment results.

•For this research focuses on Moodle in a LAMP environment.

•A LAMP environment is composed of Linux, Apache, MySQL and PHP scripting languages.

•Thus, our research was to analyze and assess the system for assessing the risk of Moodle in a LAMP environment from log files.

4

Page 5: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

•To analyze the composition of systems of risk assessment for Moodle learning in a LAMP environment from log files.

•To evaluate the suitability of the compositions of system of risk assessment for Moodle learning in a LAMP environment from log files.

OBJECTIVES

5

Page 6: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

•Population of study is experts in the field of IS analysis and design and IT risk management.

•Sample groups are 5 experts in the field of IS analysis and design and IT risk management.

Population and sample group

6

RESEARCH SCOPE

Page 7: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

•Independent variable is systems of risk assessment for Moodle learning in a LAMP environment from log files.

•Dependent variable is the compositions’ suitability of systems of risk assessment for Moodle learning in a LAMP environment from log files.

Variables used in the research

7

RESEARCH SCOPE (2)

Page 8: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

CONCEPTUAL FRAMEWORK

IT Risk assessment

-Risk identification

-Risk analysis

-Risk evaluation

Log files

-Log facilities

-Log priorities

-Log format Moodle e-learning

environment analysis

Log File analysis

Moodle in a LAMP

environment System analysis

on the risk assessment

for moodle learning in a

LAMP environment

from log files

Risk assessment

for moodle learning

in a LAMP environment

from log files

8

Page 9: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

• The first phase: Analysis of the composition of the system. 1. Studying, analyzing and synthesizing of research

papers.

2. Analyzing the components of the system.

3. Designing system components.

4. Presenting the system components to the advisors.

5. Create tools for evaluating the suitability of the system.

RESEARCH METHODOLOGY

9

Page 10: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

• The second phase: The evaluation of the compositions’ suitability. 1. Five experts to determine and evaluate the suitability

of such a system.

2. Improving the system’s components.

3. Presenting analyzed compositions of the system.

4. Analyzing the results of the evaluation

RESEARCH METHODOLOGY(2)

10

Page 11: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

RESULTS

•The research findings are presented as follows:

Section one: The composition of system.

Section two: The results of the evaluation.

11

Page 12: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

12

RESULTS (2)

The composition of system

Page 13: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

1. Central log file :

13

RESULTS (3)

• A depository of log files.

• It composed of five modules:

Linux system log files module.

Apache webserver log files module.

MySQL database log files module.

Moodle log files module.

Firewall log files module.

Page 14: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

14

RESULTS (4)

2. Log file analysis

1) Log file normalization module

• Decomposing tables to eliminate data redundancy

and undesirable characteristics.

• Identifying the desired event and filtering out

unwanted events.

• Converting the format of the log files from different

sources into the same format.

• Combining the log files from different sources

together.

Page 15: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

15

2. Log file analysis (cont.)

RESULTS (5)

2) Log file database module

• Filling

• Changing

• Storing the log files into the database.

Page 16: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

16

2. Log file analysis (cont.)

RESULTS (6)

3) Correlation analysis module

•Baselining and anomaly detection.

•Scanning to detect weaknesses or vulnerabilities of

OS and applications.

Page 17: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

3. Risk assessment

17

• Identification of assets.

• Ranking the asset .

• Impact area is categorized in the 1-5 scale

• The importance ranking of the individual assets.

1) Risk identification modules

RESULTS (7)

Page 18: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

3. Risk assessment (cont.)

18

• Scales the vulnerability and threat.

• The level of vulnerability and threat are specifying

on the basis of the correlation of the log files from

IDS.

• Vulnerability based on two factors: the severity of

the impact that occurred and the damage exposed.

• Threat considers by likelihood.

• The level is categorized in the 1-5 scale.

2) Risk analysis module

RESULTS (8)

Page 19: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

19

• Determine the level of risk.

• The scale of vulnerability and threat following the risk

matrix following ISO/IEC 27005:2011.

• Ranking of the importance of risk assessment criteria and

the situation of risk.

• These also lead to the treatment risks.

• The next step is managing the risks (risk management).

3) Risk evaluation module

3. Risk assessment (cont.)

RESULTS (9)

Page 20: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

The results of the evaluation

• The evaluation of the composition’s suitability by

the 5 experts.

• Focusing on the principles and concepts of system.

20

RESULTS (10)

Page 21: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

The results of the evaluation (cont.)

21

RESULTS (11)

Page 22: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

22

The results of the evaluation (cont.)

RESULTS (12)

Page 23: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

23

The results of the evaluation (cont.)

RESULTS (13)

Page 24: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

• The composition of the systems can be described as follows:

1. Central log file

2. Log file analysis

3. Risk assessment

DISCUSSION AND CONCLUSIONS

24

Page 25: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

•The suitability average level is at highest level

•Myers, J. and colleague. (2009) who suggested that the best practices of log management should be considered for possible usefulness in detecting insider threats.

•The composition of the system derived from the analysis can be improved and real usage.

DISCUSSION AND CONCLUSIONS (2)

25

Page 26: Systems Analysis of Risk Assessment  for Moodle Learning in a LAMP Environment from Log Files

Thank you

[email protected]

26