Secure Videoconferencing Proposal. IT & Computer Science Research
Secure Videoconferencing Communications Transcript
You have been appointed the Deputy Chief Information Security Officer at one of the subsidiaries of the media company you work for. As the company continues to expand geographically, the CEO wants to manage travel costs by using real-time low cost commercial video conferencing systems for meetings and collaboration. However, such systems come with security issues.
There have been disturbing reports of malicious actors stealing emails, videos, and sensitive data from other media companies. The company's Chief Information Officer, or CIO, and Chief Technology Officer, or CTO, say that video conferencing systems will integrate with the current enterprise networks. But they did not assess system options.
They, along with the Chief Information Security Officer, or CISO, have asked you to recommend a modernization strategy for the company's video conferencing while maintaining the security of the sensitive information discussed by the users. Business communications between subject matter experts, engineers, and executive leaders must be protected. Your task is to provide a proposal for a secure video conferencing system.
You need to analyze the features of three videoconferencing systems and provide an overview of each system. After you complete the overview of the systems, you'll recommend a system which best meets the business functionality and security requirements. You will also prepare a set of high level executive briefing slides to give the CEO and CIO an overview of your study. Your study and recommendation will be critical to the company's success.
Cybersecurity professionals are frequently required to assess the security, risk applications, and systems for business communications before they can be added to an organization's network. CISOs need to assess risks posed to the organization and develop new security measures or adjust current measures to address these risks appropriately. These evaluations involve comparing competing applications or systems against the organization's baseline to determine the best balance between business needs and the security and risk appetite of the organization.
Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. These systems are trusted to facilitate sensitive and proprietary discussions through their use of encrypted communication channels. Yet these systems have vulnerabilities and are prone to threats and attacks ranging from phishing, credential compromise, and even malware insertion. Therefore, analysis of possible threats, attacks, and vulnerabilities inherent in these systems is critical in developing defense and protection strategies for voice and video data at all endpoints and during transit.
In this project, you will create a proposal for a secure videoconferencing system, which will include One page executive summary.
There are five steps in this project. Each steps will give specific guidelines and instructions. Please adhere to the instruction. In-text citation, avoid using 1st and 2nd person such as we, our, I etc.
Step 1: Develop Functional Requirements for Videoconferencing.
The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs.
In developing those requirements, research three videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco Webex and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements.
The functional requirements and the three possible solutions will be a section of your Proposal for Secure Videoconferencing. In the next step, you will review the challenges of implementing those solutions.
Step 2: Discuss Implementation Challenges.
In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems.
Additionally, explain how system administration or privileged identity management will operate with these systems. You will also need to examine how data exfiltration will occur with each of the new systems.
The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your Proposal for Secure Videoconferencing. In the next step, you will take a closer look at the track records of each of the potential videoconferencing vendors.
Step 3: Identify Vendor Risks.
You've finished outlining the pros and cons of three videoconferencing systems. Now, it's time to take a close look at how they serve their clients. This will take some research. Look at the systems' known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work-arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure.
This step will be a section of your Proposal for Secure Videoconferencing.
In the next step, you will outline best practices for secure videoconferencing that will be part of your overall proposal to management.
Step 4: Develop Best Practices for Secure Videoconferencing
The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company's videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping.
This "best practices" section will be part of the overall Proposal for Secure Videoconferencing.
In the next step, you will develop system integrity checks within a virtual lab environment.
It's time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best meets the business functionality and security requirements of the company. As part of that recommendation, you will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study.
The assignments for this project are as follows:
Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing.
Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.
Note: Please read and follow the steps. time deliverable is very important, avoid first and second person, references has to match citations, executive summary is one page, spell out abbreviation first time and break up long paragraphs over half page in length. APA format
SECURE VIDEOCONFERENCING
Name:
Subject:
Instructor:
Date:
Secure Videoconferencing
Executive Summary
Video Conferencing increases engagement and builds trust like in person to person interactions, through inviting others to involve in meetings using their standard-based video systems as well as proprietary systems like Skype, Cisco WebEx and Polycom. Skype is a web-based conferencing system that provides the capability of sharing information and data via the sharing of files, text messages, calls across the globe and video chatting. The software allows over 250 individuals in one video conference at their convenience. Cisco WebEx is a software that is flexible in sharing video and audio-conferencing demands for organizations of all sizes. Polycom software assists make low-cost conference audio and video calls whereas increasing productivity in meeting rooms, classrooms, big conference rooms and boardrooms.
Even with the significant growth of Microsoft Skype, Cisco WebEx and Polycom for business, firms still require to overcome numerous challenges like low-quality video or audio, glitches and security concerns to realize measurable business benefits from combined communications.
When considering vendor risks, the company should consider the number of participants, video feeds, ease of use, type of meetings, mobile experience, audio and video recording, screen sharing, room systems, application integration and customer support.
Systems administrators and users should follow best practices like updating current system, generation of encryption keys, utilization of single sign-on for user authentication, securing through firewalls, and policy implementation for secure videoconferencing.
Step 1: Functional Requirements
Video Conferencing increases engagement and builds trust like in person to person interactions, through inviting others to involve in meetings using their standard-based video systems as well as proprietary systems. There exist many video conferencing systems that provide features like real-time screen sharing, remote desktop control and the recording of ongoing meetings. Additional functional requirements are systems with cloud storage, encryption for securing and encrypting information and mobile access (Agi & Gong, 2012). There are many different types of this system but this proposal will present only the best three and give to implementation team for approval
Skype
Skype is a web-based conferencing system that provides the capability of sharing information and data via the sharing of files, text messages, calls across the globe and video chatting. It has ratings of best VoIP solutions throughout the globe. The software allows image and document sharing, chatting capability group videos and instant messaging (Shepard, 2002). It is affordable and almost everyone uses it owing to its flexibility considering its pricing. Based on organization and business communication, the software is the most suitable VoIP solution as it is inexpensive. Additional advantages include its capability to provide communication plethora that boost productivity and fosters collaboration among teams. The system requires less intensive knowledge to install and it enables the firm to totally implement and maximize productivity.
Skype for business may cost the data company about $2.0/mo. or $5.50/mo. for each user with an yearly commitment. Since the company is using windows 10 version 1507, it will require support of processor over 1 GHz, RAM over 512 MB and additional software of over DirectX v9.0.
The software allows over 250 individuals in one video conference at their convenience. It operates on all devices like android mobile phones and desktops thereby making communication simple between the teams with diverse devices. It offers secure communication lines that have stronger encryption and authentication features, productivity, sharing of texts and calls, remote desktop and screen sharing. Some of the limitations of the software includes its reliability to businesses and internet use
Cisco WebEx
Cisco WebEx is a software that is flexible in sharing video and audio-conferencing demands for organizations of all sizes. It needs integration of primary tools to allow the users to carry out video and data, online sharing of audio and online meetings. It can offer users real-time solutions as well as experiences.
Cisco WebEx will cost the company about $30/user monthly for up to 5,000 employees. Since the company is using windows 10, 2 GB RAM Intel Dual-Core CPU 2.XX GHz or AMD processor. Cookies and JavaScript should be enabled on browsers but not on Google Chrome and Mozilla Firefox utilizers.
Its features are suitable for large scale product introduction and educational purposes. It enhances team collaboration as well as brainstorming, by enabling sharing of conference and audio features. It offers good stability when having meetings and flexibility on numerous tools.
The advantages of WebEx provide a simple user interface though it is less intuitive. The users can share desktops, documents and other applications on their computers. The software allows fast and easy changes to presenters, creation of whiteboards, and mouse and pass keyboard control thereby offering seamless meeting experiences.
The disadvantage is that it chooses internet explorer as its default browser thus limiting users using Chrome of Firefox.
Polycom
Polycom software assists make low-cost conference audio and video calls whereas increasing productivity in meeting rooms, classrooms, big conference rooms and boardrooms. It is compatible with other video conference equipment and can be utilized with other platforms like Skype and Lync for businesses. The software offers high definition voice and telepresence conferencing products for all environments. Its advantages include sharing of content, use of many displays, content sources and cameras, simple user interface, smart pairing, clear sound and compatibility with SVC-technology. The system may cost $729.00 to $895.00 and its MSRP base price is about $18,999.00.
Step 2: Implementation Challenges
Even with the significant growth of Microsoft Skype, Cisco WebEx and Polycom for business, firms still require overcoming numerous challenges to realize measurable business benefits from combined communications.
The login process has version verification as well as user authentication. For aversion verification, clients send HTTP GET requests that contain keyword “getlatestversion” to servers. For user authentication, the user contacts super nodes to get an IP address details of the login servers and their credentials are authenticated through the login server.
Skype involves instant messaging data, file transfer, voice, screen sharing, and video, and all this traffic is encrypted. Video calls consume up to 950 kbps while voice calls consume up to 30kbps. This implies Skype can exfiltrate large amounts of data (Zhang, et al., 2012). Thus, an enemy can utilize Skype as the communication medium to exfiltrate data off and this may cause low quality video or audio (Skype Limited, 2010).
When implementing Skype, users may experience low-quality video or audio. There is no much significance in a video conference if users cannot see or hear each other in a clear way (Nitin, 2014). Its implementation may suffer delay, echo, garbles sound, background noise and low volume. All these must be eliminated to sustain the flow of conferences and keep the users engaged.
To fix this issue, the media company identify all probable causes of poor audio and video quality. The causes can be identified by looking through the whole system by accessing QoS statistics for frame rate, packet loss, latency and jitter. This will allow for connected visibility which implies having all components such as endpoints, network, software, hardware and vendors of the system in a single place. The company must therefore change to a comprehensive as well as proactive monitoring and troubleshooting framework
👀 Other Visitors are Viewing These APA Essay Samples:
-
Article Review. Big Data and Database Technologies
6 pages/≈1650 words | No Sources | APA | IT & Computer Science | Research Paper |
-
Different Types of Digital Forensic Imaging in Investigations
11 pages/≈3025 words | 5 Sources | APA | IT & Computer Science | Research Paper |
-
Mobile Incident Response and Investigations IT Research Paper
13 pages/≈3575 words | 5 Sources | APA | IT & Computer Science | Research Paper |