Journal of Positive School Psychology http://journalppw.com 2022, Vol. 6, No. 11, 1743-1752 Reliable Cyber Security And Improvement In E-Learning System Aman Kumar 1 , Dr. Anil Pandit 2 , Dr. Sumanjeet Singh 3 1 Research Scholar, GNA University, Phagwara, Punjab & Assistant Professor, NIFT Kangra, Himachal Pradesh 2 Assistant Professor, GNA University, Phagwara Punjab, India 3 Associate Professor, Ramjas College, University of Delhi Abstracts. Some of the cloud-based education solutions for distance learning that have been previously offered have a lack of security. Researchers have decided to strengthen security rather than reduce it, but this raises the question of performance, as it takes a long time to safeguard the data. Consideration of performance and security challenges in a cloud-based education system for remote learning is the topic of this research article. It is necessary to have a system in place that can protect educational materials while not impairing student learning. An online education system based on the cloud and its approach and constraints is discussed in this study. To ensure both security and performance, new research is needed, and the breadth of such a system is described. E- learning system security and performance have been the topic of an academic study in the field of cyber-security. Simulated results are compared against RSA-based results. Keywords: Cyber security, Cloud Environment, Performance, Security, E-learning Introduction. E-Learning security concerns include preventing data modification, user authentication fraud, and confidentiality breaches. Interoperability for apps, learning environments, and heterogeneous systems is becoming increasingly important in the current e-Learning landscape. For example, Graf (2002) claims that the employment of information communication technology in online learning might lead to several security problems such as unauthorized access to essential data as well as vandalism of public information services. Main Cyber Security Threats 1. Ransomware Attackers encrypt an organization’s data, and they demand cash to decrypt it. 2. Cryptojacking When fraudsters exploit a victim's computer to mine bitcoin without their knowledge. 3. Threats against data Breach of data. 1.3.1 Security Factors In a cloud system, viruses and external assaults have resulted in Security Treats. As a result, instructional information on a network might be compromised. Hackers are responsible to get unauthenticated access to data. Crackers are on the other side, responsible for breaking the encryption. Security measures like encryption and firewalls are commonly employed. The following assaults, however, have the potential to compromise security attacks: 1. Brute Force 2. Trojan Horse 3. Man in Middle 4. Denial of Service 5. SQL Injection 1.3.2 Performance Factors Increasing the system's security requires the adoption of time-consuming encryption techniques that also impact the system's performance. Numerous variables can affect how well a cloud environment