Limit search to items available for checkout
E-BOOK
Title Moodle Security.
Imprint Birmingham : Packt Pub., 2011.

Copies/Volumes

LOCATION CALL # STATUS
 Internet  Electronic Book    AVAILABLE
Description 1 online resource (320 pages)
Note Available only to authorized UTEP users.
Print version record.
Contents Moodle Security; Moodle Security; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers, and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Delving into the World of Security; Moodle and security; Weak points; The secure installation of Moodle; Starting from scratch; Installation checklist; Quickly securing Moodle; Review the Moodle security overview report; Summary; 2. Securing Your Server Linux.
Securing your Linux-the basicsFirewall; User accounts and passwords; Removing unnecessary software packages; Patching; Apache configuration; Where to start; Directory browsing; Load only a minimal number of modules; Install and configure ModSecurity; MySQL configuration; PHP configuration; Installation; File security permissions; Discretionary Access Control-DAC; Directory permissions; Access Control Lists; Mandatory Access Control (MAC); Adequate location for a Moodle installation; How to secure Moodle files; DAC; ACL; Summary; 3. Securing Your Server-Windows; Securing Windows-the basics.
FirewallKeeping OS updated; Configuring Windows update; Anti-virus; New security model; File security permissions; Adequate location for Moodle installation; Installing and securing PHP under Internet Information Server; Preparing IIS; Getting the right version of PHP; Configuring php.ini; Adding PHP to the IIS; Creating Application pool; Create new website; Adding PHP mapping; Securing MySQL; MySQL configuration wizard; Configure MySQL service to run under low/privileged user; Create a mysql account; Summary; 4. Authentication; Basics of authentication; Logon procedure.
Common authentication attacksWeak passwords; Enforcing a good password policy; Protecting user logon; Closing the security breach; Password change; Recover a forgotten password; Preventing a potential security risk; Securing user profile fields; User model in Moodle; Authentication types in Moodle; Manual accounts; E-mail based self-registration; Specifying allowed or denied e-mail domains; Captcha; Session hijacking; No login; Summary; 5. Roles and Permissions; Roles and capabilities; Capability; Context; Permissions; Role; How it all fits together; Standard Moodle roles; Customizing roles.
Overriding rolesBest practices; Risky capabilities; Summary; 6. Protection Against Bots; Internet bots; Search engine content indexing; Harvesting email addresses; Website scraping; Spam generators; Protecting Moodle from unwanted search bots; Search engines; Moodle and search engines; Moodle access check; Protection against spam bots; User profiles; E-mail-based self-registration; User blogs; Moodle messaging system; Cleaning up spam; Protection against brute force attacks; Summary; 7. Securing User Files; Uploading files into Moodle; How Moodle stores files; Points of submitting user files.
Summary Learn how to install and configure Moodle in the most secure way possible.
Other Title Print version: Miletic, Darko. Moodle Security. Birmingham : Packt Publishing, ©2011 9781849512640