Book Image

Moodle Security

Book Image

Moodle Security

Overview of this book

Table of Contents (17 chapters)
Moodle Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface

Summary


In this chapter we learned about the Moodle permission system and the explained concepts on which it is built. We gave a detailed example of permission calculation and influence of context precedence on the final outcome. In the last part we described best practices for using and applying roles within Moodle. We also presented the capabilities that may expose the system to a security risk and recommended ways of using them.

In the next chapter we will focus on protection against robots and spam-bots.