官术网_书友最值得收藏!

Chapter 1. Delving into the World of Security

Welcome to Moodle Security!

In the early days of the web, Internet was mostly used for academic purposes. Hence, all communications protocols had very little or no focus on security. The situation started changing as more and more public and commercial services started moving online and common users started actually using Internet in their daily routine. With the increase of user base we see the emerge of the malicious groups of users, the so-called hackers that are focused mostly on information theft and illegal usage. Nowadays it is quite common to be attacked by hacker(s). In fact it is so common and frequent that it is reported that only the USA's cyber attacks generate costs up to 10 billion dollars every year. The purpose of this book is to introduce you to web security while focusing on Moodle.

In this chapter we will cover the following topics:

  • Moodle and security
  • Weak points
  • The secure Moodle installation
  • Quickly securing Moodle

Moodle and security

Moodle is an open source CMS (Course Management System)/LMS (Learning Management System)/VLE (Virtual Learning Environment). Its primary purpose is to enable educational institutions and individuals to create and publish learning content in a coherent and pedagogically valuable manner, so that it can be used for successful knowledge transfer towards students.

That sounds harmless enough. Why would anybody want to illegally access an educational platform?

There are various motives of computer criminals. In general, they are people committed to the circumvention of computer security. This primarily concerns unauthorized remote computer break-ins via a communication network such as the Internet. Some of the motives could be:

  • Financial: Stealing user and/or course information and selling it to other third-parties
  • Personal: Personal grudge, infantile display of power, desire to alter assigned grades, and so on

Weak points

Moodle is a web application and as such must be hosted on a computer connected to some kind of network (private or public—Internet / Intranet). This computer must have the following components:

  • Operating System (OS)
  • Web server
  • PHP
  • Database server
  • Moodle

Each of these pieces can be used as a point of attack by a malicious user(s) in order to obtain access to the protected information. Therefore, it is our task to make all of them as secure as possible. The main focus will be directed towards our Moodle and PHP configuration. At the end of the book you can find some recommended literature for additional reading.

主站蜘蛛池模板: 泰来县| 巴楚县| 潞西市| 永安市| 玉环县| 克东县| 福贡县| 阜宁县| 山阳县| 乌拉特后旗| 北辰区| 南澳县| 东乌珠穆沁旗| 清徐县| 武隆县| 和林格尔县| 江阴市| 铜川市| 南汇区| 永善县| 北宁市| 富锦市| 繁昌县| 临清市| 松原市| 鸡西市| 神池县| 清水河县| 广丰县| 甘南县| 固镇县| 开鲁县| 股票| 河东区| 苏尼特右旗| 连江县| 新沂市| 高阳县| 大兴区| 鄱阳县| 稷山县|