+1(978)310-4246 credencewriters@gmail.com
  

Description

Problem statement

COVID-19 was declared a pandemic on March 11, 2020. As a result, organizations needed to immediately leverage technology to continue operations. Most organizations embraced web conferencing and other online capabilities, as a means to conduct meetings and other functions that would have normally occurred in person. Zoom meetings have become sensational as they are among the most popular sources for web conferencing, information sharing, and remote collaboration. The widespread use of Zoom and other web conferencing tools brought with them a host of security issues, leaving users vulnerable to hacking and meeting invasions. The purpose of this traditional research is to examine the threats associated with web conferencing tools, specifically Zoom, Microsoft Teams, WebEx, and Google Meet. As a comparison/contrast, the researcher also seeks to discover what security measures were employed by these utilities to mitigate risks, reduce threats, and enhance the user experience.

Presentation Requirements:

Project introduction

Brief description of the issue, project, problem

Overview ONLY of:

Your findings (Results, Discussion, and Conclusions) for Traditional Research

Share what went well in the project

Share what could be improved

Share what you learned about:

Project management

Following procedures

Yourself

***I have attached a sample paper to use as a reference for the presentation requirements.

Running head: VIDEO CONFERENCING TOOLS
Video conferencing tools: Security Threats and Solutions
1
VIDEO CONFERENCING TOOLS
2
Table of Contents
Abstract
3
Video conferencing tools: Security Threats and Solutions
4
Problem Statement
4
Research Question
4
Rationale
5
Literature Review
5
Methodology
7
Data Preparation
7
Final Data Analysis
8
Results
8
Discussion
9
Conclusion
9
References
10
VIDEO CONFERENCING TOOLS
Abstract
The use of video conferencing tools has increased significantly as Covid-19 pandemic
continues to change how people live their daily lives. This new form of technology presents
different threats to companies including unauthorized access and privacy concerns. This study
looks at information collected form IT experts who provide relevant information. The identified
prevailing threat is the presence of privacy concerns. However, results provided form this study
indicate the importance of improving cybersecurity to ensure that these threats are mitigated.
3
VIDEO CONFERENCING TOOLS
4
Introduction
The COVID-19 pandemic has resulted in a crisis as every aspect of how we live has been
changes. People are now forced to changes how they interact, communicate and even work. The
corporate world has also seen tremendous changes as most businesses have been forced to close
their offices because of new government regulations (De’, Pandey & Pal, 2020). The inability to
operate within the offices especially for businesses not categorized as providing essential
services has resulted in many companies asking their employees to work from home. the
continuing of this trend has meant that technology has been on the frontline to maintaining
business activities. video conferencing through applications such as Google Meets, Zoom,
Microsoft Teams ad Webex among others has increased significantly as companies strive to
maintain business operations (De’, Pandey & Pal, 2020). While these video conferencing
applications have been key in the continuity of communication, they also present cyber threats
and issues that need to be addressed by companies.
Problem statement
COVID-19 was declared a pandemic on March 11, 2020. As a result, organizations
needed to immediately leverage technology to continue operations. Most organizations embraced
web conferencing and other online capabilities, as a means to conduct meetings and other
functions that would have normally occurred in person. Zoom meetings have become sensational
as they are among the most popular sources for web conferencing, information sharing, and
remote collaboration. The widespread use of Zoom and other web conferencing tools brought
with them a host of security issues, leaving users vulnerable to hacking and meeting
invasions.The purpose of this traditional research is to examine the threats associated with web
conferencing tools, specifically Zoom, Microsoft Teams, WebEx, and Google Meet. As a
VIDEO CONFERENCING TOOLS
5
comparison/contrast, the researcher also seeks to discover what security measures were
employed by these utilities to mitigate risks, reduce threats, and enhance the user experience.
Research Questions
•
What are the evolving threats that companies face with the increased use of video
conferencing applications during the COVID-19 period?
•
What are the measures that should be implemented to reduce related risks from the use of
video conferencing applications?
Purpose/Rationale
The health concerns following the Covid-19 pandemic resulted in lockdowns and many
companies were unable to continue with normal business activities. Moving online in this case
was an involuntary step for companies implying that most of them were not fully prepared for
the transition. The new working environment presents a wave of opportunities and at the same
time threats, especially on the security front. Analyzing these challenges will provide the
necessary information that would equip companies with necessary information and strategies to
ensure that they maximize the current way use technology.
Literature Review
Teleworking is the use of the technology-assisted practice to work at home or remotely
and utilizes internet-communication systems, online digital applications, and email facilities.
Video conferencing is one of the options that have been used to accelerate communication
remotely. One of the effects of the Covid-19 pandemic has resulted in an explosion in the use of
video conferencing technologies as there is tens of millions daily use of users on WebEx, Zoom,
and Google meet (De’, Pandey & Pal, 2020). These products have allowed people to connect at
VIDEO CONFERENCING TOOLS
6
different times in different locations. The increase in the use of video conferencing tools has
increased the focus on security with the use of these communications. The security concerns
related to the use of video conferencing technology can be categorized into six categories namely
loss of personal information, software development risk, interception of communications,
damage to privacy, illicit access to stored data, and use of influence operations (Rathore et al.,
2017). While some of these problems are unintended, they still result in disruptive behavior.
However, in some cases, there are intentional and malicious attackers who intend to disrupt
normal functioning.
In video telecommunication, the video and audio input from the device’s microphone and
camera are converted from the traditional analog format to a digital signal which can then be
transmitted over the internet. The compression software in this case shrinks the data making it
smaller, faster, and easier to transfer. When the information is received, on the other hand, codec
software is responsible for compressing the information and converting it back to analog signals
which can then be played on a screen or speakers (Pottayya, Lapayre & Garcia, 2017). Most
video telecommunication technology also uses special software that suppresses noise and
controls sounds. In this case, users are required to either install the application or attending a
meeting by connecting through their respective browsers.
While there are different risks with using videoconferencing, it is not an efficient avenue
for financial cybercrime as users rarely share any financial information, therefore, limiting
opportunities for phishing. At the same time, given that most companies usually do not share
sensitive information such as intellectual property, there is a limited possibility that business
conferences can result in crimes such as cyber espionage or some cases financial crime (De’,
Pandey & Pal, 2020). On the other hand, there is an increased risk that video conferencing can
VIDEO CONFERENCING TOOLS
7
result in interception especially in cases where the signal is not encrypted. However, in the case
of eavesdropping, is difficult in a video conference session is difficult because names or images
always appear during the meetings (De’, Pandey & Pal, 2020). The only way that it is possible to
listen to a conversation would be through wiretapping which would occur when an individual
listens to speech or video while it is being transmitted over the internet. More so, given that all
software has bugs which are unintentional coding errors that can be risk areas for illicit access.
Privacy issues are also a security threat that is associated with the use of video
conferencing tools. However, privacy risks are associated or rather dependent on the data that the
service provider collects and how this information is used. The type of information collected in
different types of video communicating technology include names, phone numbers, email
addresses, and addresses (He, Zhang & Li, 2021). The most prevalent risk that users are more
concerned about is related to the installation of these video conferencing applications which are
at risk of being hacked. It is possible that additional information can be accessed especially when
these applications are utilized on personal devices.
Methodology
Research Design
This study would utilize a qualitative which would allow for the collection of information about
the security risks that have been experienced since the adoption of video conferencing systems.
Participants
The individuals that include part of the population are information technology experts
who are more aware of the security threats that companies using this type of technology. These
individuals can either be female or male and would have to have experience in assessing security
VIDEO CONFERENCING TOOLS
8
threats in new forms of technology. A total of 30 individuals would be consulted in this process
to collect the relevant data.
Instrumentation
the main instrument that would be utilized to collect information, in this case, interviews which
would be based on prepared questions before the interview.
Procedure
The selected individuals would be scheduled to have a meeting through the preferred mode of
communication.
Data Processing and Analysis
Data analysis would make the process of thematic analysis which would include categorizing
related information and associating relevant information for common themes.
Summary
Generally, data collection includes a collection of information from IT experts who are
aware of security threats. These individuals would help to provide relevant information that
would pinpoint security issues related to the use of video conferencing tools. This information
would then be analyzed for thematic analysis to determine relevant information for the study.
Results
One of the security concerns that emerge from the collected information is that users
were more concerned about privacy issues. Privacy concerns are related to the type of
information collected from users. In cases where users were utilizing personal devices, a security
concern was the type of data that the company would access and if there would be a breach of
VIDEO CONFERENCING TOOLS
9
privacy. Companies and individuals are advised to update their security by installing antivirus as
this can prevent unauthorized access or loss of data. Minimizing the type of information shared
especially in cases where information is private is an important implementation needed to
prevent unauthorized access.
Discussion
In response to the Covid-19 pandemic which has created a new market for video
conferencing tools, many companies have been left with no other option but to replace face-toface meetings with video communication tools. Cybersecurity has become a real concern as users
connect to the internet which creates a loophole for unauthorized access. The application of
various software increases the risk that bugs within the software can be accessed by unauthorized
personnel. Companies need to come up with additional measures such as anti-virus and
minimizing sharing of personal information during these calls. The current security measure
needs to continue to be implemented and research is done on possible areas of focus for
companies to ensure that more information is determined about the use of video conferencing
technology.
Conclusions
As video conferencing technology continues to become a favorite for companies striving
to maintain their business activities, there has been an emergence of threats, especially on
privacy concerns. It is important that companies liaison with their employees to identify the
privacy concerns that they any have especially on the type of information that is collected
through these avenues. Regardless, companies must continue to research on the use of video
conferencing tools to ensure that it is safe and effective for communication.
VIDEO CONFERENCING TOOLS
10
VIDEO CONFERENCING TOOLS
11
References
De’, R., Pandey, N., & Pal, A. (2020). Impact of digital surge during Covid-19 pandemic: A
viewpoint on research and practice. International journal of information management, 55,
102171. https://doi.org/10.1016/j.ijinfomgt.2020.102171
He, W., Zhang, Z. J., & Li, W. (2021). Information technology solutions, challenges, and
suggestions for tackling the COVID-19 pandemic. International Journal of Information
Management, 57, 102287.
Pottayya, R. M., Lapayre, J. C., & Garcia, E. (2017, March). An adaptive video conferencing
framework for collaborative telemedicine. In 2017 IEEE 31st International Conference on
Advanced Information Networking and Applications (AINA) (pp. 197-204). IEEE.
Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security:
Issues, challenges, threats, and solutions. Information sciences, 421, 43-69.

Purchase answer to see full
attachment

  
error: Content is protected !!