Sign In
Not register? Register Now!
Pages:
7 pages/≈1925 words
Sources:
4 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 51.03
Topic:

Secure Videoconferencing Proposal. IT & Computer Science Research

Research Paper Instructions:

Secure Videoconferencing Communications Transcript
You have been appointed the Deputy Chief Information Security Officer at one of the subsidiaries of the media company you work for. As the company continues to expand geographically, the CEO wants to manage travel costs by using real-time low cost commercial video conferencing systems for meetings and collaboration. However, such systems come with security issues.
There have been disturbing reports of malicious actors stealing emails, videos, and sensitive data from other media companies. The company's Chief Information Officer, or CIO, and Chief Technology Officer, or CTO, say that video conferencing systems will integrate with the current enterprise networks. But they did not assess system options.
They, along with the Chief Information Security Officer, or CISO, have asked you to recommend a modernization strategy for the company's video conferencing while maintaining the security of the sensitive information discussed by the users. Business communications between subject matter experts, engineers, and executive leaders must be protected. Your task is to provide a proposal for a secure video conferencing system.
You need to analyze the features of three videoconferencing systems and provide an overview of each system. After you complete the overview of the systems, you'll recommend a system which best meets the business functionality and security requirements. You will also prepare a set of high level executive briefing slides to give the CEO and CIO an overview of your study. Your study and recommendation will be critical to the company's success.
Cybersecurity professionals are frequently required to assess the security, risk applications, and systems for business communications before they can be added to an organization's network. CISOs need to assess risks posed to the organization and develop new security measures or adjust current measures to address these risks appropriately. These evaluations involve comparing competing applications or systems against the organization's baseline to determine the best balance between business needs and the security and risk appetite of the organization.
Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. These systems are trusted to facilitate sensitive and proprietary discussions through their use of encrypted communication channels. Yet these systems have vulnerabilities and are prone to threats and attacks ranging from phishing, credential compromise, and even malware insertion. Therefore, analysis of possible threats, attacks, and vulnerabilities inherent in these systems is critical in developing defense and protection strategies for voice and video data at all endpoints and during transit.
In this project, you will create a proposal for a secure videoconferencing system, which will include One page executive summary.
There are five steps in this project. Each steps will give specific guidelines and instructions. Please adhere to the instruction. In-text citation, avoid using 1st and 2nd person such as we, our, I etc.
Step 1: Develop Functional Requirements for Videoconferencing.
The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs.
In developing those requirements, research three videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco Webex and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements.
The functional requirements and the three possible solutions will be a section of your Proposal for Secure Videoconferencing. In the next step, you will review the challenges of implementing those solutions.
Step 2: Discuss Implementation Challenges.
In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems.
Additionally, explain how system administration or privileged identity management will operate with these systems. You will also need to examine how data exfiltration will occur with each of the new systems.
The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your Proposal for Secure Videoconferencing. In the next step, you will take a closer look at the track records of each of the potential videoconferencing vendors.
Step 3: Identify Vendor Risks.
You've finished outlining the pros and cons of three videoconferencing systems. Now, it's time to take a close look at how they serve their clients. This will take some research. Look at the systems' known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work-arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure.
This step will be a section of your Proposal for Secure Videoconferencing.
In the next step, you will outline best practices for secure videoconferencing that will be part of your overall proposal to management.
Step 4: Develop Best Practices for Secure Videoconferencing
The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company's videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping.
This "best practices" section will be part of the overall Proposal for Secure Videoconferencing.
In the next step, you will develop system integrity checks within a virtual lab environment.
It's time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best meets the business functionality and security requirements of the company. As part of that recommendation, you will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study.
The assignments for this project are as follows:
Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing.
Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.
Note: Please read and follow the steps. time deliverable is very important, avoid first and second person, references has to match citations, executive summary is one page, spell out abbreviation first time and break up long paragraphs over half page in length. APA format

Research Paper Sample Content Preview:

SECURE VIDEOCONFERENCING
Name:
Subject:
Instructor:
Date:
Secure Videoconferencing
Executive Summary
Video Conferencing increases engagement and builds trust like in person to person interactions, through inviting others to involve in meetings using their standard-based video systems as well as proprietary systems like Skype, Cisco WebEx and Polycom. Skype is a web-based conferencing system that provides the capability of sharing information and data via the sharing of files, text messages, calls across the globe and video chatting. The software allows over 250 individuals in one video conference at their convenience. Cisco WebEx is a software that is flexible in sharing video and audio-conferencing demands for organizations of all sizes. Polycom software assists make low-cost conference audio and video calls whereas increasing productivity in meeting rooms, classrooms, big conference rooms and boardrooms.
Even with the significant growth of Microsoft Skype, Cisco WebEx and Polycom for business, firms still require to overcome numerous challenges like low-quality video or audio, glitches and security concerns to realize measurable business benefits from combined communications.
When considering vendor risks, the company should consider the number of participants, video feeds, ease of use, type of meetings, mobile experience, audio and video recording, screen sharing, room systems, application integration and customer support.
Systems administrators and users should follow best practices like updating current system, generation of encryption keys, utilization of single sign-on for user authentication, securing through firewalls, and policy implementation for secure videoconferencing.
Step 1: Functional Requirements
Video Conferencing increases engagement and builds trust like in person to person interactions, through inviting others to involve in meetings using their standard-based video systems as well as proprietary systems. There exist many video conferencing systems that provide features like real-time screen sharing, remote desktop control and the recording of ongoing meetings. Additional functional requirements are systems with cloud storage, encryption for securing and encrypting information and mobile access (Agi & Gong, 2012). There are many different types of this system but this proposal will present only the best three and give to implementation team for approval
Skype
Skype is a web-based conferencing system that provides the capability of sharing information and data via the sharing of files, text messages, calls across the globe and video chatting. It has ratings of best VoIP solutions throughout the globe. The software allows image and document sharing, chatting capability group videos and instant messaging (Shepard, 2002). It is affordable and almost everyone uses it owing to its flexibility considering its pricing. Based on organization and business communication, the software is the most suitable VoIP solution as it is inexpensive. Additional advantages include its capability to provide communication plethora that boost productivity and fosters collaboration among teams. The system requires less intensive knowledge to install and it enables the firm to totally implement and...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to scientific essays: