<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2017-2-1-20-27</article-id><article-id pub-id-type="publisher-id">1072</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>SECURITY ASSESSMENT OF UNIVERSITY DISTANCE EDUCATION</article-title><trans-title-group xml:lang="en"><trans-title>SECURITY ASSESSMENT OF UNIVERSITY DISTANCE EDUCATION</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Oladko</surname><given-names>Vladlena Sergeevna</given-names></name><name xml:lang="en"><surname>Oladko</surname><given-names>Vladlena Sergeevna</given-names></name></name-alternatives><email>oladko.vs@yandex.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Babenko</surname><given-names>Aleksey Alexandrovich</given-names></name><name xml:lang="en"><surname>Babenko</surname><given-names>Aleksey Alexandrovich</given-names></name></name-alternatives><email>ba_benko@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Aleksina</surname><given-names>Anastasiya Aleksandrovna</given-names></name><name xml:lang="en"><surname>Aleksina</surname><given-names>Anastasiya Aleksandrovna</given-names></name></name-alternatives><email>ulesova_anastasia@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2017</year></pub-date><volume>2</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2017/1/3.pdf" /><abstract xml:lang="ru"><p>Research is devoted to information security problem of distance education university system. The functions, tasks, subjects and elements have been determined in the system of distance education. The technological process of processing information in the system of distance education is described and are marked its vulnerability. The model of threats is made and identified basic directions of the security system of distance education. The need for regular assessment of the security as a means of monitoring the effectiveness of the protection system is shown. The authors have proposed and formalized approach to the choice of rational method of distance education system security assessment. A comparative analysis of the vulnerability assessment methods showed that the development model of the university LMS security assessment is the most rational methods of quantitative and qualitative evaluation of security through the levels.</p></abstract><trans-abstract xml:lang="en"><p>Research is devoted to information security problem of distance education university system. The functions, tasks, subjects and elements have been determined in the system of distance education. The technological process of processing information in the system of distance education is described and are marked its vulnerability. The model of threats is made and identified basic directions of the security system of distance education. The need for regular assessment of the security as a means of monitoring the effectiveness of the protection system is shown. The authors have proposed and formalized approach to the choice of rational method of distance education system security assessment. A comparative analysis of the vulnerability assessment methods showed that the development model of the university LMS security assessment is the most rational methods of quantitative and qualitative evaluation of security through the levels.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information security</kwd><kwd>threats</kwd><kwd>attacks</kwd><kwd>information system</kwd><kwd>educational institution</kwd><kwd>threat model</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security</kwd><kwd>threats</kwd><kwd>attacks</kwd><kwd>information system</kwd><kwd>educational institution</kwd><kwd>threat model</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1. Babenko A.A. The use of remote sensing technologies in the preparation of information security professionals // Proceedings of the Baltic State Fishery Academy: psychological and pedagogical sciences. 2011. No 4. P. 44-52/</mixed-citation></ref><ref id="B2"><mixed-citation>2. Kolgatin A.G. Information security in open education systems // Educational Technology and Society. Vol.17 2014, No1. P. 417 &amp;ndash; 425.</mixed-citation></ref><ref id="B3"><mixed-citation>3. Koshkin E.N. SWOT-analysis of distance learning in Russia // Bulletin of the International Institute of Economics and Law. 2013. №4 (13). S.28-31.</mixed-citation></ref><ref id="B4"><mixed-citation>4. Method of determining the information security threats in information systems. The draft guidance document // Official site FSTEC Russia. URL: http://fstec.ru/component/attachments/download/812 (reference date 10/03/2016).</mixed-citation></ref><ref id="B5"><mixed-citation>5. Positive Research Report 2016 // Analysis company Positive Technologies 2016. URL: http://www.ptsecurity.ru/upload/ptru/analytics/Positive-Research-2016-rus.pdf (9/29/2016 treatment date).</mixed-citation></ref><ref id="B6"><mixed-citation>6. Report McAfee Labs threats for February 2015 [Electronic resource] // Company McAfee Labs. URL: http://www.mcafee.com/ru/resources/reports/rp-quarterly-threat-q4-2014.pdf?cid=BHP035 (reference date 10/03/2016).</mixed-citation></ref><ref id="B7"><mixed-citation>7. Callegari C., Vaton S., Pagano M. A. New statistical approach to network anomaly detection .Proc. of Performance Evaluation of Computer and Telecommunication Systems (SPECTS). No. 8 (2008); P.441-447.</mixed-citation></ref><ref id="B8"><mixed-citation>8. Landoll, D.J. The security risk assessment handbook (Second Edition). Boca Raton, BC: CRC Press, 2011.474 p.</mixed-citation></ref><ref id="B9"><mixed-citation>9. Rahman, M., &amp;amp; Al-Shaer, E.A. Formal Framework for Network Security Design Synthesis. Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems (2013): P. 560-570.</mixed-citation></ref><ref id="B10"><mixed-citation>10. Whitman, M.E., &amp;amp; Mattord, H.J. Management of Information Security (Fourth Edition). Cencage Learning, 2014. 566 p.</mixed-citation></ref></ref-list></back></article>