Security Analysis System E-learning at one of the University in Indonesia

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    E-learning is one of the services that were developed massively in education. Therefore the application of the system security is also very taken into account, this is done in order to user comfort e-learning system mainly reflects the e-learning system for on-line or better known by the term e-learning. In this research, the authors attempted to analyze the security system e-learning at one of the universities in Indonesia by using the tools sniffing cain and abel to detect the vulnerability when a user e-learning while doing logged if the username and password is visible and tools Acunetix Web vulnerability scanner to analyze more remote security loopholes contained in e-learning system at one of the universities in Indonesia, In additions Acunetix Web Vulnerability scanning tools can inform the whole of each vulnerability found on e-learning system at one of the universities in Indonesia located on level 3 High, this shows that e-learning on one of the university is very vulnerable to threats.



  • Keywords

    E-learning, System Scurity, Vulnerability, Sniffing.

  • References

      [1] Anonymous. 2008. Accreditation Standards and Procedures Undergraduate Studies Program. Ministry of Education, National Accreditation Board for Higher Education, Jakarta.

      [2] Ramdhani, M. A, dan Wulan, E. R. (2012). The Analysis of Determinant Factors In Software Design For Computer Assisted Instruction. IJSTR, 1 (8), 69-73.

      [3] Indrajit, R. E., dan R. Djokopranoto. 2004. College of Modern Management. School of Information Management and Computer PERBANAS, Jakarta.

      [4] Pernul, G. (1997). Database Security and Internet Systems, Department of Information Systems University of Essen.

      [5] Raharjo, B. (2002). “Internet-Based Information System Security”. PT Insan Indonesia – Bandung dan PT INDOCISC – Jakarta.

      [6] Sasongko, A. (2011). “Web Server Security Guide”. The Ministry of Communication and Information of the Republic of Indonesia, Information Security Directorate, The Directorate-General for Informatics Applications.


      [8] Date, C.J. (2000). An Introduction To Database Systems, Seventh Edition, Addison-Wesley.

      [9] Slamet, C. (2012). The Implementation of Strategic Planning for Information System in Educational Foundation. International Journal of Basic and Applied Science, Vol. 01, No. 01, July 2012, 89-94.

      [10] Martin, J. (1975). Computer Data-Base Organization. Prentice Hall National Computer Security Center, A Guide To Understanding Discretionary Access Control in Trusted Systems, Version 1, National Computer Security Center, 30 September 1987.

      [11] Sutanta, E. (2008). “Security Analysis System Application (Application E-learning Case Studies in IST AKPRIND YOGYAKARTA”

      [12] Date, C.J. (2000). An Introduction To Database Systems, Seventh Edition, Addison-Wesley.

      [13] Akbar, M. dan Perdana, I. “Comparative Analysis Between Web Application Vulnerability Scanner Acunetix and Nikto.

      [14] Lukito, R. B. (2008), Analysis and Security Policy Studies, A Case Study System E-learning At University BCD.

      [15] Michael E. Whitman, Herbert J. Mattord. (2010). Management of Information Security 3rd Edition, Boston, USA.

      [16] Ellis, J. dan Speed, T. (2003). Internet Security : “A Jumpstart for Systems Administrators and IT Managers”




Article ID: 26686
DOI: 10.14419/ijet.v8i1.9.26686

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.