Purpose: The following main objective will
guide this book to explore the enigma of E-Learning
Problem
The impact of using ICT in teaching
physical Science also harms schools. However, attaining the expected benefits
has not always materialised due to inadequate policy frameworks, implementation
plans, and ineffective communication of these benefits to intended users,
resulting in conflicts between users, managers, and implementers. Elimination
of geographical obstacles for e-students to be able to access resources from
any location is essential merit. There is a deluge of cyberattacks metered on
the e-learning and teaching which are viruses, eavesdropping, Denial of Service Attack, Ransom ware and others
Methodology
Finally, the explanatory design was adopted to elucidate the correlation between variables. This tactic is appropriate to elucidate and interpret correlations. More specifically, the study adopts a QUANTITATIVE + qualitative notation, where the qualitative component is a less dominant approach than the quantitative component. The Saunders Research Onion was applied in unravelling the Enigma in E-Learning.
Key Finding
The
Pearson correlation results demonstrate a positive relationship between the
positive impact of using ICT in teaching
and learning Physical Science and student performance. The variable used to
deconstruct the constructs was improved teaching and learning increased performance,
and increased pass rate. The variable for improves student performance is 0.88,
and that one for increased pass rate 0.66. It can be concluded that there is a
robust correlation between the positive impact of teaching and learning
Physical Science and increase in student performance; this also increases pass
rate. The researcher, therefore, accepts Ho; There is a significant positive relationship between
the positive impact of using ICT in teaching and learning Physical Science and
student performance and rejection. Ha: There is no significant positive
relationship between using ICT in teaching and learning Physical Science and
student performance
Key Recommendation
As a risk reduction approach, it is
recommended that patching, education and training, biometric security, uncrack able passwords, patch management, encryptions, digital signatures, firewalls,
new cybersecurity tactics, updated anti-viruses from reliable vendors should be
executed in the organization. The state
within the office of the presidency should adopt some cybersecurity measures
and policies meant for human capital development and training these including
the creation of the secure cyber ecosystem utilizing a national nodal
agency, corporate encouragement for appointing a senior member as a
Chief Cybersecurity Officer for crafting
the updated cyber- security policies
Research question ;Which
of the following e-learning Enigma are you
encountering during the teaching?
COMPUTER VIRUSES
When participants were asked which of
the following ICT challenges are encountering during the teaching and learning
process, six per cent Strongly disagree that viruses are a challenge, twenty-three
per cent were neutral, thirty-one per cent disagree, and the remaining thirty-eight
per cent strongly agree. The findings of this research are analogous to the
works of Falco (2018). Although the lexis “viruses” is often misconstrued to
all infection’s computers may suffer, in pragmatism, it refers explicitly to a
program that is adequately attached to another program (e.g., Word Document or
spreadsheet) and can reduplicate itself. When the program is run, the virus replicates
itself, attached to a new rubric. In time, a virus can bog a computer down to a
wriggle. Viruses may also infect a boot sector or sector. These latter viruses
are unethical to the sectors, making it not feasible to reboot the computer. At
times viruses have built-in timers. They await an appropriate date and time(time-bombs),
then do a programmed task like completely obliterating your hard drive. A generic
way to detect these viruses is by transferring someone else’s infected files
into your system or loading an infected file off cyberspace. Email viruses are
somewhat like chalk and cheese. They bow out through email. You are specifically
persuaded to open an attachment that will comprise the virus. Only by having an
up-to-date virus scanner and meticulously managing unknown files which reasonably
poise your computer is safe.
Source Author (2020)
COMPUTER WORMS
Worms cannot duplicate within a
computer; however, they replicate by being transferred from one computer to
another, either via a susceptibility in the system or via email. Like the
computer virus, they can do an enormous hurt to a computer they infect. Except
for not duplicating within cyberspace, they perform much like viruses and can
be every bit as harmful. Also, like the viruses, you can only sentimentally
become safe if you deploy a current update of excellent anti-virus software and
be very meticulous about what programs you download and what email attachments
you open.
TROJAN HORSES
Trojan horses penetrate your system by allowing
them into your computer. Specifically, they show themselves as something they
are NOT– a game, perchance. Once in your configuration, plethoric Trojan horses
send data about your computer to remote locations. Hackers deploy through these
“back door” Trojan horses consequently gain access to your system.
Source Author (2020)
SPYWARE
Spyware is a program that works much like
a Trojan horse. People (often shareware authors) insert spyware into innocent-looking
programs, and people load the files that contain the programs onto their
computers. Once on your computer, the spyware will track your movements and
purchasing patterns on the Internet. Companies collect the information and sell
it as marketing databases. Spyware that collects only statistical information
is not illegal. Nonetheless, when you have spyware loaded, you serve
information from your computer to a remote location. Specialized spyware
removal programs can remove it.
CRASHES
Viruses, worms, Trojan horses, and
hackers can destroy your system with no notice. Furthermore, as your operating
system becomes older, it tends to become buggy, and it can shut down. Technically
speaking, "crashing" a computer refers to the hard drive failing, but
it can also mean a board is burning up. Over time, it has come to denote any
time your computer shuts down without notice. You should assume that your
computer is going to crash. Maybe you get hacked and your computer ruined, or
your copy of Photoshop overloads the system and shuts you down, or maybe you
suffer a brownout. It does not matter much why the system shuts down; the
question is, how do you protect yourself?
HACKERS AND CRACKERS
Source Author (2021)
Our
town is under destructive cyber-warfare. Urban vital infrastructure that
encapsulates the electric grid, water networks, transportation systems, and
public health and safety services are recurrently under siege targeted by
cybercrimes. Urban vital infrastructure has been incrementing linked to cyberspace
for the desideratum of exceptionally convenience and efficiency as part of the incrementing
Industrial Internet of Things (HoT). Unfortunately, when deciding to link this
configuration, their cybersecurity was taken for granted. A hacker can monitor,
access, and alter these systems at their discretion because of the
infrastructure's security deficiency. This is not only a matter of latent
inopportuneness. Digital attacks of these instruments can have to obliterate
tangible consequences. The three steps
town should take to prepare for cybercrimes and defend themselves accordingly.
First, towns must appreciate how an attacker should make vulnerable its
fundamental infrastructure. In the first discourse, I delineate and show a
methodology for quantifying attack vectors across a town CCTV security system.
The attacking approach deploys established cybersecurity typologies to craft an
attack ruleset for an Al planner fashioned to perform attack generation. With this,
towns can automatically identify all feasible tactics hackers can take to make
their strategic infrastructure vulnerable.
Towns need to make urgent and vital their cyber risks. Cyber negotiation
is one of the plethoric non-technical cyberdefense devices -Defensive Social
Engineering, where those who suffered viral attacks can deploy social
engineering against the hacker. Cyber negotiation encapsulates deploying a
negotiation frame of reference to seclude attacks with steps urban strategic l
infrastructure executors can take before, during and after an attack
Hackers (breaking your system) depict
themselves as varied from Crackers (also steal or do damage). Most people do
not make such a difference. Most see a slight variation between entering your
computer and managing all of your items, penetrating your home, managing all of
your items, and pilfering some of them. Hackers have plethoric methods for
seeking and accessing your computer. They might mass mail a Trojan horse, but
they can also just run programs that ping all feasible IP addresses of your
computer. When exposed and answers, the hacker may take his or her
transgressing into your system. Computers have scores of portals visible to the
Ethernet. Plethoric of them can tacitly be breached. A hacker with your IP
address can navigate all of the ports until they get and open one. If you do
not know you have cyber-security, penetrating your system can be very easy indeed.
Once in your system, hackers may browse your files for private information
about you and your credit.
Moreover, computers with firewalls that
exclude them from the pinging are compelled to generate reports for each ping –
thousands of reports for thousands of pings every few seconds. Since it is your
computer and not the hacker’s, you are the one the authorities find and
question. Computers attached to DSL connections, cable modems, or the Ethernet
are specifically vulnerable to hacking and should be secluded with an
up-to-date firewall
An excellent example is the Commercial
Crime International US which offered $ three million rewards for Russian hackers.
The United States presented a three million reward – to the highest ever
regarding cybercrime – for blowing a whistle on a Russian hacker indicted with
bank conspiracy and fraud. Russian citizen Evgeniy Bogachev is indicted in the
US with managing a computer attack network called Game over Zeus, which
embezzled more than $100 million from online bank accounts. FBI investigations
showed that the ‘Game over Zeus’ computer virus is accountable for one million
computer corruptions. Other indictments of wire fraud, money laundering and
computer fraud prevailed against Bogachev in several US courts. Bogachev
allegedly trapped personas by gathering their monetary information through
malevolent software (malware) that logged user’s keystrokes for passwords and
bank PINs when the gullible fatalities entered their bank account information.
It is also alleged that the same hacker is the one who engineered Ransom ware Crypto Locker U.S. corporates are anticipated to endure over
65,000 ransomware attacks — and that is
“a conservative number,” John Chambers, former CEO of Cisco Systems (CSCO), told Live With McDonald’s (MCD), JBS (JBSAY), and
Pipeline, electricity, road lights, fuel. All recently coming under blitzkrieg,
Chambers does not construe an end to the blitzkrieg of cybersecurity blitzkrieg.
He estimated that the quantum of ransomware attacks in 2021 could culminate as
enormous as 100,000, with each one costing corporate and arithmetic $170,000.Chambers also enunciated the need for enterprises to enhance their recognition
capabilities to safeguard the integrity of their private information and
computing systems. He noted voice identification technology as one of the
strategic tools for enterprises to ensure that only individuals with the proper
credentials have access to their systems
Source
Author (2021)
When participants
were asked about ICT Challenges they encountered during the teaching and
learning process, thirty-eight per cent were neutral, eighteen per cent
disagreed, strongly disagreed, and strongly agreed that eavesdropping was a
challenge. Eavesdropping is listening to interlocution without permission. The findings of this discourse are similar to the
works of Falco, Viswanath and Caldera (2020). Eavesdropping should be construed
in the context of passwords which is labelled as an adversary’s advances to
learn the password by observing the user, getting a written copy of the
password, or some analogous attack that encapsulates the tangible proximity of
user and adversary. Another feature of
eavesdropping is keystroke logging (keylogging), in which dangerous hardware or
software is deployed in the computer so that the attacker can use the user’s
keystrokes for later analysis. A configuration that relies on plethoric determinants
(e.g., password plus token or password plus biometric) is resilient to this
type of attack. For a token, an equivalent threat is pilferage of the sign or tangible
copying of the token. Again, a plethoric
protocol is resilient to this type of attack better than a pure token protocol.
The equivalent threat for a biometric protocol is replicating or imitating the biometric
parameter to produce the needed template.
Dynamic biometrics are less vulnerable to such
attacks. For stationery biometrics, device authentication is a vital
countermeasure. Replay attacks encapsulate an adversary recurring a previously
captured user feedback. The most generic countermeasure to such attacks is the predicament-response
protocol. The distributed computing ecosystem, the virtual
private network (VPN), renders an attractive remedy to network administers. In essence,
a VPN comprises a plethora of computers that interface through a relatively
unsecure network and ensure the encryption and vital protocols to furnish
security. At each corporate site, workstations, servers, and databases are connected
by one or more local area networks (LANs)
Denial
of Service Attack
When participants were asked which of the following ICT Challenges are
encountering during the teaching and learning process, eighteen per cent disagree
and strongly disagree that Denial of Service Attack is an ICT challenge they
encounter during the teaching and learning process. Twenty-seven per cent Strongly
agree and Neutral that Denial of Service Attack is a challenge they encounter during
teaching and learning. Denial of Service
Attackers may moot concealed directories within your computer that allows them
to store (and even deliver) pornography or other information they do not want
to be lined to their systems. Once in your system, hackers habitually deploy it
to attack other systems. A hack attack on a computer will habitually pass
through the plethora of “zombies" on their way. Another recurrent
deployment of hackers for your computer is Denial of Service (DOS) attacks on
other systems. These attacks are crafted to interrupt interfaces in enormous
systems. For example, when hackers have accumulated adequate computers, they
might have them all instantaneously ping the server in a business often as they
are capable. The computer being pinged, compelled to answer the pings
recurrently and becomes useless
.
Source Author (2021)
Lack
of Access
When participants were asked if
lack of access was a predicament during the teaching and learning process, most
students strongly agree that there is a lack of access to computers. This
provided a standard deviation of 1.2 and an arithmetic mean of four. The pronouncements
of this research are similar to the works of Alvarez (2019), who posit that Technology
is prevalent all around us and fathoming its role in the crafting and educational
performance of learners is an incrementing concern for many educators. Access
to home computers has been deduced to be steadily incrementing. This monograph
sets out to verify the inequalities of academic performance that prevails among
those juveniles with home computer access and those without. People surveyed
embraced learners, with 35% of the students being Caucasians, and the median
annual income reported to be $35,000-$45,000. Students were given access to
school computers for six weeks and encouraged to use them for educational
purposes. The findings show a minimal synopsis increase in learners' reading
levels, insufficient intervention time, and further research. Unfortunately,
not every home can furnish the necessary computers and related technology to
their children. Due to deficiency of interest, fathoming, or opportunity, a so-called
“digital divide” in computer access has resulted between those juveniles who have
merits from computer technology and those underprivileged children who are
progressively being left behind. This time series analysis
has led to incrementing regard for those juveniles without home computer access
to perchance be at a de-merit when it comes to improving school performance.
Arguments for the deficiency of computer access at home, a strategic
contributing factor being the socioeconomic status of families, depicts a latent
for children of low-income families to execute at a lower educational level juxtaposed
to their peers with computer access at home
Source Author (2021)
Lac
of funding, infrastructure, computers
Source Author
Lack of funding
Nine per cent of
the participants disagree, eighteen per cent were neutral, twenty-seven per cent
agree, while forty-five per cent strongly agree that lack of funding is an ICT challenge
that they encounter during the teaching and learning. Times are difficult for
many schools in Namibia due to the COVID crisis and economic downturn. Lack of
constituency development funds has been recognized as an obstacle to
development. The councilor of Epukiro constituency in the Omaheke region,
Vejama Kanguatjivi, uttered that his constituency is stressed to reach the pursued
goals due to deficiency of much-needed funds
Nonetheless, I
have a phobia that, as a young investigator commencing my ICT research
programme, I am not a top priority for reviewers at the Namibian Institutes. For the first time, I hear hushed talk among
senior staff that well-established principal investigators may have to let ICT
lab members go or even shut their doors in the coming months. In our lab, some
of us may have to move on if we cannot soon acquire fellowships and other
research grants to cover our salaries. I worry that Namibia regional and state governments
are sending the wrong message to young researchers. Moreover, that means a more
tenuous future for young health scientists in Canada — I included
Lack of infrastructure
Eight per cent of
the participants disagree and are neutral that lack of infrastructures are ICT challenges
they encounter during the teaching and learning process; fifteen per cent agree.
In contrast, sixty-nine per cent strongly agree that lack of infrastructure is an
ICT challenge that they are encountering during the teaching and learning
process; the findings of this research are analogous to the monography of Shanmugam
(2020). Information
and Communication Technology has radicalised the concept of e- libraries. ICT
has almost changed the universe into a global village. E-Libraries are also being
radicalised to meet the users’ needs thrust upon them. The new generation whose
demand for data never met is recurrently demanding that conventional ICT
libraries be progressed as well-equipped and interlinked as computerized
libraries. Public libraries are the requirements of society to train ordinary
people about their rights and duties, spread the ecosystem of democracy, and teach
the values and ethos among the people. One may find these infrastructures l at
every level like state, provincial and district level. It meets every typical habitat
living in the country. The people living in the villages may benefit from the
public libraries to update the information about their states’ development and
technological changes. Information and communication technology has ushered a
vital role in the infrastructure sector. The application of ICT is vital for
public libraries because these e-libraries disseminate information that is strategic
for ordinary people
Lack of computers
Eight per cent strongly
disagree and disagree, while eighteen per cent agree, and sixty-nine per cent agree
that the lack of computers are ICT challenges they encounter during the
teaching and learning process. CBT is the instruction, by computer, of a self-paced instruction
to a student. Yes, just like so much eLearning. The computer software occurs when
a tutor executes the task of instruction more efficaciously (CBT is generally
regarded as 50% faster than the appropriate classroom experience) and maybe
more proficiently. The lack of computers affects CBT in Science
Source Author (2020)
Lack
of Mobile Network
Fifteen per cent strongly agree, fifty-four
per cent agree, twenty-three per cent are neutral, and eight per cent disagree,
fifteen per cent strongly agree that lack of mobile networks are ICT Challenges
that they encounter during the teaching and learning process. Many public
schools do not have sufficient immobile networks, so learners cannot take
advantage of recent advances in mobile networks. Many incumbents upon “bring
your device.” This has made multifarious the education IT ecosystem because
schools end up with a myriad of devices and operating systems, making it complex
to link hardware and link learners to each other. The result is an ICT “Tower
of Babel” with interoperability predicaments and poor societies.
Furthermore, above all, “bring your apparatus”
is only fine for those have who have devices. Those who do not are left behind,
and the concept is not implementable when there is a lack of mobile networks in
the area and school
Source Author (2021)
Conclusion
Participants
were asked to rank the E-learning enigmas in terms of damage and impact on the
learning process; nine per cent of the participants highlighted that it was
high with 75% impact. Also, the same percentage indicated it was low with 25%,
the exact percentages of 9% also indicated it was shallow with 0% impact The
highest percentage of 45% indicated that the impact is moderate with 50%
impact. The remaining 27% asserted that it was very high with one hundred per cent
impact. In a nutshell, the impact of hacking on eLearning is moderate to a vast
continuum scale. The Hackers can be taxonomised as Black, White & Grey
White Hat. Hackers are legalized and salaried by the corporates, with
excellent thinking. They work with the notion to create revenue intentions for
others. They are also called “ICT Technicians”. These are designated for the
betterment of the enterprise. The corporate may deploy them to evaluate their
security to check the robustness of security and enhance it. They make inputs
on their ambiguities and make security robust. Ethical hackers belong to this
taxonomy. For ex- they hack into malicious groups for excellent reasons. An
epitome for white hat hackers is shown in Black Hat Hackers; They are
also labelled as crackers or malicious hackers. They target banks or other
enterprises with inadequate security and steal money or credit card
information. They crash all the security and make the network less secure and
pilferage all precious information. It is recommended that the state should put
in place countermeasures against illegal hacking.