Table of Contents
Preface
Part 1: Moodle Security Primer
1
Moodle Security – First Steps
Technical requirements
A short history of hacking
The Watergate scandal – a man-in-the-middle attack
Phreaking – VoIP fraud
Cracking encryption – SSL attacks
Fundamental security requirements
Understanding risk
The regulatory environment
Statutory requirements
Insurance requirements
Service License Agreement (SLA) requirements
ITT requirements
Creating a risk register
Description of risk
Probability
Impact
Mitigation action
Summary
2
Moodle Threat Modeling
Technical requirements
Cybersecurity terminology
What are we working on?
Data flow diagrams
Microsoft Threat Modeling Tool
Identifying threats with STRIDE
Spoofing
Tampering
Repudiation
Information Disclosure ...
Get Moodle 4 Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.