Panita Wannapiroon, Ph.D. Assistant Professor Preecha Pangsuban Ph.D. Candidate Prachyanun Nilsook, Ph.D. Associate Professor Division of Information and.

Slides:



Advertisements
Similar presentations
Significance Testing.  A statistical method that uses sample data to evaluate a hypothesis about a population  1. State a hypothesis  2. Use the hypothesis.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture14: DHCP Switched Networks Assistant Professor Pongpisit Wuttidittachotti,
Magia G. Krause Ph.D. Candidate School of Information University of Michigan Society of American Archivists Annual Meeting August 14, 2009 Undergraduates.
Conceptual Framework of Information and Communication Technology to Promote the Proactive Involvement of Global Merit Principle in Cultivating Youths’
SYSTEMS ANALYSIS OF PROACTIVE CUSTOMER RELATIONSHIP MANAGEMENT THROUGH MOBILE DEVICES IN A HIGHER EDUCATION Panita Wannapiroon Assistant Professor, Department.
Security Controls – What Works
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Integrated Product Development in Internet Surroundings Igor Fuerstner Visoka tehnička škola Subotica Vojvodina, Serbia.
GIS Models and Modeling Chapter 14. Introduction A model is a simplified representation of a phenomenon or system A model is a simplified representation.
By: Ashwin Vignesh Madhu
1 Assessment and Evaluation for Online Courses Associate Professor Dr. Annabel Bhamani Kajornboon CULI’s 6 th Intl Conference: Facing.
The Effectiveness of Supplemental Online vs. Traditional Tutorials on Students’ English Proficiency and Learning Achievement Ponlak Pantahachart Faculty.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
The Computer Science Course at Omar Al-Mukhtar University, Libya The Computer Science Course at Omar Al-Mukhtar University, Libya User-Centered Design.
Research Methods Ass. Professor, Community Medicine, Community Medicine Dept, College of Medicine.
Reading Literature to Write Analysis: Fiction in the Composition Classroom Karen McLeer, Ph.D. Associate Professor of English UW-Richland Thank you to.
Division of Information and Communication Technology for Education, Faculty of Technical Education, King Mongkut's University of Technology North Bangkok,
Chapter 2: The Research Enterprise in Psychology
Attention Deficit Hyperactivity Disorder (ADHD) Student Classification Using Genetic Algorithm and Artificial Neural Network S. Yenaeng 1, S. Saelee 2.
The Fifth TCU International e-Learning Conference “Overcome the Uncertainty of Technology in Education” August 5-6, 2014, in Bangkok, Thailand Sorraya.
FS1. Suriya Pumchalerm. INTRODUCTION PURPOSE OF RESEARCH STUDY RESEARCH METHODLOGY RESEARCH RESULT CONCEPTUAL FRAMEWORK DESIGN SYSTEM DISCUSSION.
Multiple Group Structural Equation Modeling Development for Factor Analysis that affects Information Technology Service Management of Higher Educational.
Muban Chombueng Ratjabhat University King Mongkut's University of Technology North Bangkok Nawin Kongrugsa Assoc. Prof. Dr. Prachaynun Nilsook Asst. Prof.
LOGO The Development of Collaborative Project–Based Learning Via Augmented Reality m-Learning for Thai and The Lao People’s Democratic Republic Students.
Faculty of Information Technology and Communication for Education King Mongkut’s University of Technology North Bangkok, Thailand Design of Intelligent.
Digital Library Operating Management System by North Bangkok University Suphot Phuangkamnerd 1 Prachyanun Nilsook 2 and Ravisada Thamrongviwanna3 1 North.
Ph.D. Candidate Assistant Professor Thassanee Rodmunkong KMUTNB Division of Information and Communication for Education (DICT), Faculty of Technical.
ELEMENTS OF A KNOWLEDGE MANAGEMENT SYSTEM IN A CLOUD COMPUTING ENVIRONMENT FOR PROFESSIONAL EXPERIENCE TEACHER TRAINING Mr. Anuchit AnupanAssoc.Prof.Dr.
Prachyanun Nilsook, Ph.D. Associate Professor Krich Sintanakul, Ph.D. Assistant Professor Competency Assessment System in Accordance with the Occupational.
LOGO Division of Information and Communication Technology for Education, Faculty of Technical Education, King Mongkut’s University of Technology North.
King Mongkut’s University of Technology North Bangkok Prachyanun Nilsook Ph.D. Associate Professor “ e-Training for Classroom-based Action Research” Kanphitcha.
The Fifth TCU International e-Learning Conference “Overcome the Uncertainty of Technology in Education” August 5-6, 2014, in Bangkok, Thailand Chantana.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Design of the Virtual Learning Environment with Scaffolding System to support a Brain-based Learning to develop the Creativity of undergraduate student.
Elements of Learning Design for MOOCs Yuwanuch Gulatee 1 and Prachyanun Nilsook 2 1 Edith Cowan University, Perth, Australia Nakhonphanom University, Nakhonphanom,
BUSINESS INFORMATICS descriptors presentation Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST) Linkoping.
Learning outcomes for BUSINESS INFORMATCIS Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST)
System Analysis of Virtual Team Collaboration Management System based on Cloud Technology Panita Wannapiroon, Ph.D. Assistant Professor Division of Information.
Panita Wannapiroon Ph.D. Assistant Professor Division of Information and Communication Technology for Education Faculty of Technical Education King Mongkut's.
Back Next 1 1 SUPERVISOR B. JEYAPRAGASH Assistant Professor, Department of Library and Information Science, Bharathidasan.
Online Multiuser Interactive Learning System on Social Cloud Conceptual Framework Division of Information and Communication Technology for Education Faculty.
Pallob Piriyasurawong Ph.D Assistant Professor Panita Wannapiroon Ph.D Assistant Professor Tanawat Jariyapoom Ph.D. Candidate Division of Information and.
Sorraya Priaoprasit Ph.D. Candidate Ph.D. Program in Information and Communication Technology for Education, Faculty of Technical Education, King Mongkut’s.
Total Quality Management Trend of Education Digital Television Station The Fifth TCU International e-Learning Conference “Overcome the Uncertainty of Technology.
Using Augmented Reality for Teaching Physics Somsak Techakosit a, Assoc. Prof. Dr. Prachaynun Nilsook b a Kasetsart University Laboratory School Center.
The Confirmatory Factor Analysis of the Quality Criteria for Education Digital Television Station in Thailand Ph.D. Program in Information and Communication.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Panita Wannapiroon, Ph.D.
Development of Knowledge Transfer for Support Novice Researchers Pradit Songsangyos Ph.D. Student Divisions of Information and Communication Technology.
2 INTRODUCTION PURPOSE OF THE STUDY CONCEPTUAL FRAMWORK SCOPE OF THE STUDY RESEARCH METHODOLOGY RESULT CONCLUSION 3.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Division of Information and Communication Technology for Education, Faculty of Technology Education, King Mongkut’s University of Technology North Bangkok,
A Goal Based Methodology for Developing Domain-Specific Ontological Frameworks Faezeh Ensan, Weichang Du Faculty of Computer Science, University of New.
ISECON 2006 The Work System Model as a Tool for Understanding the Problem in an Introductory IS Project Doncho Petkov Eastern Connecticut State University.
Chapter 2 Doing Sociological Research Key Terms. scientific method Involves several steps in research process, including observation, hypothesis testing,
Chantana Papattha, Ph.D. Lecturer July 20-21, 2015 at BITEC, in Bangkok, Thailand Rajamangala University of Technology Phra Nakhon & King Mongkut’s University.
The Analysis of Green University Resource Planning on Cloud Computing Jarumon Nookhong Ph.D. Candidate IEC 2015 International e-Learning Conference 2015.
Over View of CENELC Standards for Signalling Applications
Abstract This research was aimed to examine the requirement factors of entrepreneurs from graduates of Bachelor of Science and to compare those requirements.
Instructors’ General Perceptions on Students’ Self-Awareness Frances Feng-Mei Choi HUNGKUANG UNIVERSITY DEPARTMENT OF ENGLISH.
Statistics Module Statistics Statistics are a powerful tool for finding patterns in data and inferring important connections between events in.
Chantira Chiaranai, RN, PhD Institute of Nursing Suranaree University of Technology Electronic Learning Portfolio: An Innovation Emphasizing Self-directed.
Assistant Instructor Nian K. Ghafoor Feb Definition of Proposal Proposal is a plan for master’s thesis or doctoral dissertation which provides the.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Personnel Effort Budget
Personnel Effort Budget
Approximate Confidence Interval for the Ratio of Normal Means
M. Kezunovic (P.I.) S. S. Luo D. Ristanovic Texas A&M University
  Using the RUMM2030 outputs as feedback on learner performance in Communication in English for Adult learners Nthabeleng Lepota 13th SAAEA Conference.
Presentation transcript:

Panita Wannapiroon, Ph.D. Assistant Professor Preecha Pangsuban Ph.D. Candidate Prachyanun Nilsook, Ph.D. Associate Professor Division of Information and Communication Technology for Education, Faculty of Technical Education, King Mongkut's University of Technology North Bangkok, Thailand. Systems Analysis of Risk Assessment for Moodle Learning in a LAMP Environment from Log Files 1

INTRODUCTION Moodle is the most popular open source e-Learning. It has higher capabilities of learner tools, support tools and technical specifications tools than the other softwares. Many researches showed that the Moodle not without risk. Moodle had higher number of vulnerabilities compared to its commercial (Joh, 2013). Unfortunately, it has not been systematically tested for vulnerabilities and weaknesses (Martinez et al., 2013). 2

INTRODUCTION (2) Commonly, Log file is used primarily for troubleshooting problems. Log file contains information related to many different types of events occurring within networks and systems (Kent, K., 2006). Log file analysis is statistical algorithms to determine incident severity and then assigns a threat score based on asset value. The risk assessment of Moodle was evaluated by log file analysis approach. 3

INTRODUCTION (3) The ISO/IEC27005:2011 is chosen in order to achieve the best risk assessment results. For this research focuses on Moodle in a LAMP environment. A LAMP environment is composed of Linux, Apache, MySQL and PHP scripting languages. Thus, our research was to analyze and assess the system for assessing the risk of Moodle in a LAMP environment from log files. 4

To analyze the composition of systems of risk assessment for Moodle learning in a LAMP environment from log files. To evaluate the suitability of the compositions of system of risk assessment for Moodle learning in a LAMP environment from log files. OBJECTIVES 5

Population of study is experts in the field of IS analysis and design and IT risk management. Sample groups are 5 experts in the field of IS analysis and design and IT risk management. Population and sample group 6 RESEARCH SCOPE

Independent variable is systems of risk assessment for Moodle learning in a LAMP environment from log files. Dependent variable is the compositions’ suitability of systems of risk assessment for Moodle learning in a LAMP environment from log files. Variables used in the research 7 RESEARCH SCOPE (2)

The first phase: Analysis of the composition of the system. 1. Studying, analyzing and synthesizing of research papers. 2. Analyzing the components of the system. 3. Designing system components. 4. Presenting the system components to the advisors. 5. Create tools for evaluating the suitability of the system. RESEARCH METHODOLOGY 8

The second phase: The evaluation of the compositions’ suitability. 1. Five experts to determine and evaluate the suitability of such a system. 2. Improving the system’s components. 3. Presenting analyzed compositions of the system. 4. Analyzing the results of the evaluation RESEARCH METHODOLOGY(2) 9

RESULTS The research findings are presented as follows:  Section one: The composition of system.  Section two: The results of the evaluation. 10

11 RESULTS (2) The composition of system

The results of the evaluation The evaluation of the composition’s suitability by the 5 experts. Focusing on the principles and concepts of system. 12 RESULTS (3)

The results of the evaluation (cont.) 13 RESULTS (4)

14 The results of the evaluation (cont.) RESULTS (5)

15 The results of the evaluation (cont.) RESULTS (6)

The composition of the systems can be described as follows: 1. Central log file 2. Log file analysis 3. Risk assessment DISCUSSION AND CONCLUSIONS 16

The suitability average level is at highest level Myers, J. and colleague. (2009) who suggested that the best practices of log management should be considered for possible usefulness in detecting insider threats. The composition of the system derived from the analysis can be improved and real usage. DISCUSSION AND CONCLUSIONS (2) 17

Thank you 18