SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Video Conferencing Tools
Exercise
Name some of the
Video Conference
Tools you have
used or heard of.
Video Conferencing Tools
Exercise
By what method you can guarantee
100% protection from threats while
using web conference tools?
work-from-home (WFH)
Image by Lynette Coulston from Pixabay
Vulnerabilities
Zoom Bomb: CSUB ASI Board Meeting
Breached by Trolls
https://www.youtube.com/watch?v=OEs6mdMgAKU
Zoom-bombing disrupted a House
Oversight Committee meeting
https://www.zdnet.com/article/zoom-bombing-disrupted-a-house-oversight-committee-meeting/
https://cyberhoot.com/cybrary/zoom-bombing/
Video Conferencing Security Best
Practices
• Is your current video solution is
a legacy system, or is more than
five years old?
A few things that will help you
decide if your current system is
too big a risk are:
• the type of data encryption the
system uses;
• how callers log in;
• and how the system manages
data.
https://highfive.com/blog/5-steps-for-secure-video-conferencing
Outdated System
Video Conferencing Security Best
Practices
• 128-bit Advanced Encryption
Standard (AES) protection The keys are automatically
generated at the beginning of
each video session, and according
to research, are so strong, it
would take a supercomputer one
“billion billion” years to breach a
128-bit AES key.
https://highfive.com/blog/5-steps-for-secure-video-conferencing
Logically unbreakable
Video Conferencing Security Best
Practices
• single sign-on (SSO) for user
authentication
SSO credentials are tied to a
user’s authorization and
entitlements profile, IT can
track where, when and how
credentials are used
https://highfive.com/blog/5-steps-for-secure-video-conferencing
it greatly reduces the risk of
user credentials being lost,
stolen or compromised
Video Conferencing Security Best
Practices
• Domain-based approach to
security The first mistake is connecting it
directly to the Internet without
using a firewall.
The second is setting it to
automatically answer incoming
video calls, which provides
remote intruders with easy
access.
https://highfive.com/blog/5-steps-for-secure-video-conferencing
enables the system
administrator to control
access to video conferences
by assigning various levels of
permission to users
Video Conferencing Security Best
Practices
• A video conferencing policy • Users must get permission to record a video
conference from everyone on the call.
• Personal mobile devices should not be used
to record video conferences.
• Sensitive information should be discussed in
designated video conference rooms and not
in public places or open office spaces.
• Video conferences conducted at a user’s desk
should train the camera to focus on the users
face, and any visible confidential data should
be removed from camera view.
• Cameras and microphones should be turned
off when not in use.
• Remote control of cameras is for
authenticated users only.
https://highfive.com/blog/5-steps-for-secure-video-conferencing
sensitive information, such as
hospitals and financial
institutions will want to be
specific about who users can
connect with via video
conference
Tips for protecting the video
conferencing environment
Always ensure that meetings are password-protected
Don’t share meeting information on public platforms.
Use host controls to your advantage.
Utilize waiting rooms or lobbies.
Notify users if the meeting is being recorded.
Disable file transfer features.
Always update to the latest version.
The host joins first.
Tips for protecting the video
conferencing environment
Lock calls after everyone joins
Make sure that every attendee speaks at the start of the
call, maybe even on video. It helps deal with isolation and
identifies unknown attendees.
Prevent the recording of meetings
Don’t allow participants to screen share by default.
Background Blur
https://www.businessinsider.in/slideshows/miscellaneous/here-are-the-best-funny-images-and-memes-
to-use-as-a-zoom-background/slidelist/74921244.cms#slideid=74921267
Question = How does Google Meet,
Microsoft Teams and Zoom differ in
their approach?
Microsoft Teams and Google Meet require users
to have accounts with them,
whereas Zoom allows users to participate using
their web browsers.
Google Meet (previously known as
Google Hangouts Meet )
• Google's Multi-layered security
• Meet has no need for frequent security patches, simply because the
application works fully in your browser.
• Google Meet supports the same robust privacy commitments and
data protections as the rest of Google Cloud’s enterprise services.
• In G Suite Enterprise and G Suite for Education, customers can use
additional advanced security functionalities like Access
Transparency.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Google Meet Features
• Meet doesn’t have user attention-tracking features or software.
• All data in Google Meet is encrypted in transit by default between
the client and Google for video meetings on a web browser, on the
Android and iOS apps, and in meeting rooms with Google meeting
room hardware.
• All Meet recorded meetings are stored in Google Drive and get
encrypted by default, like all data that you store in Drive.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Google Meet Features
• To secure your online meetings further, Google has taken several
anti-intruder measures to make sure your video meetings are safe
from unwanted guests. These include anti-hijacking measures for
both web video meetings and telephony dial-ins.
• The way Google Meet works, guests can enter video meetings via a
simple meeting link in the browser or Meet app. Very convenient,
but is this safe? Yes it is! Google makes it nearly impossible for
external people with bad intentions to crack your video meeting IDs
programmatically.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Avoiding unwanted guests with
secure meeting IDs
• Google Meet meeting codes are 10 characters long, with 25
characters in the set. This makes it impossible for outsiders to “guess”
meeting codes and join an internal video meeting that way.
• Pro tip: pay attention not to share your meeting links to externals
that don’t need to get access to your video meetings. This could for
example happen when you share a screenshot of your meeting room
where the meeting link is visible in the browser. These days a lot of
companies are sharing such screenshots on LinkedIn to show how
they stay in touch with their employees.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Mitigating External participants risk
through identified meeting links
• External participants from
outside the host’s domain can
join a video meeting directly
with the encrypted link. But
they can do this only if they
are on the Calendar invite for
this video meeting, or if they
have been invited by in-
domain participants from the
Google Meet session.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Mitigating External participants risk
through identified meeting links
• Any other external participants must request to join the meeting,
and this request must be accepted by a member of the host
organisation of the meeting before this person can actually enter the
meeting. Unexpected or unwanted meeting guests can simply be
refused to enter the meeting by one of the meeting hosts.
• In addition to that measure, Google also makes it impossible for
externals to join a scheduled video meeting in Google Meet more
than 15 minutes before the meeting actually starts. This is reducing
even more the opportunity window for malicious ‘meeting-bombers’
to attempt to break in your video meeting.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Good practices for Google Meet
• Only meeting creators and calendar owners can mute or remove
other participants. This ensures that instructors can't be removed or
muted by student participants.
• Only meeting creators and calendar owners can approve requests to
join made by external participants. This means that students can’t
allow external participants to join via video, and that external
participants can’t join before the instructor.
• Meeting participants can’t rejoin nicknamed meetings once the final
participant has left. This means if the instructor is the last person to
leave a nicknamed meeting, students can’t join later without the
instructor present.
https://support.google.com/a/answer/7582940?hl=en

Weitere ähnliche Inhalte

Was ist angesagt?

Google+ Hangouts Tutorial
Google+ Hangouts TutorialGoogle+ Hangouts Tutorial
Google+ Hangouts TutorialJonathan Strong
 
Video Conferencing Software Tools 2020
Video Conferencing Software Tools 2020Video Conferencing Software Tools 2020
Video Conferencing Software Tools 2020Edwin S. Garcia
 
How to use Zoom for conducting Meetings and Classes
How to use Zoom for conducting Meetings and ClassesHow to use Zoom for conducting Meetings and Classes
How to use Zoom for conducting Meetings and ClassesArpan Shrivastava
 
Google Meet Platform Tutorial
Google Meet Platform TutorialGoogle Meet Platform Tutorial
Google Meet Platform TutorialFocusU Engage
 
Google Hangouts (for dummies)
Google Hangouts (for dummies)Google Hangouts (for dummies)
Google Hangouts (for dummies)Dom Cushnan
 
Selfhelp Online class Google Hangouts Capture App (blue camera)
Selfhelp Online class Google Hangouts Capture App (blue camera)Selfhelp Online class Google Hangouts Capture App (blue camera)
Selfhelp Online class Google Hangouts Capture App (blue camera)SnowSugar Video
 
Zoom Tutorial for joining a team on Mobile
Zoom Tutorial for joining a team on MobileZoom Tutorial for joining a team on Mobile
Zoom Tutorial for joining a team on MobileNipun Sharma
 
Google Hangouts User Guide
Google Hangouts User GuideGoogle Hangouts User Guide
Google Hangouts User GuideKaitlyn Reish
 
How to use google hangout
How to use google hangoutHow to use google hangout
How to use google hangoutDon Cox
 
Google meet guide file
Google meet guide fileGoogle meet guide file
Google meet guide fileAndres Añano
 
Embedding video in powerpoint
Embedding video in powerpoint Embedding video in powerpoint
Embedding video in powerpoint tomasrandom
 
Blogging presentation
Blogging presentationBlogging presentation
Blogging presentationguest76d501a
 
Microsoft Teams Tutorial
Microsoft Teams TutorialMicrosoft Teams Tutorial
Microsoft Teams TutorialFocusU Engage
 
Google Hangouts On Air Procedure
Google Hangouts On Air ProcedureGoogle Hangouts On Air Procedure
Google Hangouts On Air ProcedureDerin A. Richardson
 
How to take a webinar
How to take a webinarHow to take a webinar
How to take a webinarPhillip Lund
 

Was ist angesagt? (19)

Google+ Hangouts Tutorial
Google+ Hangouts TutorialGoogle+ Hangouts Tutorial
Google+ Hangouts Tutorial
 
Video Conferencing Software Tools 2020
Video Conferencing Software Tools 2020Video Conferencing Software Tools 2020
Video Conferencing Software Tools 2020
 
How to use Zoom for conducting Meetings and Classes
How to use Zoom for conducting Meetings and ClassesHow to use Zoom for conducting Meetings and Classes
How to use Zoom for conducting Meetings and Classes
 
Google hangouts
Google  hangoutsGoogle  hangouts
Google hangouts
 
Google Meet Platform Tutorial
Google Meet Platform TutorialGoogle Meet Platform Tutorial
Google Meet Platform Tutorial
 
Google Hangouts (for dummies)
Google Hangouts (for dummies)Google Hangouts (for dummies)
Google Hangouts (for dummies)
 
Selfhelp Online class Google Hangouts Capture App (blue camera)
Selfhelp Online class Google Hangouts Capture App (blue camera)Selfhelp Online class Google Hangouts Capture App (blue camera)
Selfhelp Online class Google Hangouts Capture App (blue camera)
 
Talk outline
Talk outlineTalk outline
Talk outline
 
Zoom Tutorial for joining a team on Mobile
Zoom Tutorial for joining a team on MobileZoom Tutorial for joining a team on Mobile
Zoom Tutorial for joining a team on Mobile
 
Google Hangouts User Guide
Google Hangouts User GuideGoogle Hangouts User Guide
Google Hangouts User Guide
 
Adsız sunu (2)
Adsız sunu (2)Adsız sunu (2)
Adsız sunu (2)
 
How to use google hangout
How to use google hangoutHow to use google hangout
How to use google hangout
 
Google meet guide file
Google meet guide fileGoogle meet guide file
Google meet guide file
 
Embedding video in powerpoint
Embedding video in powerpoint Embedding video in powerpoint
Embedding video in powerpoint
 
Join.me basics
Join.me basicsJoin.me basics
Join.me basics
 
Blogging presentation
Blogging presentationBlogging presentation
Blogging presentation
 
Microsoft Teams Tutorial
Microsoft Teams TutorialMicrosoft Teams Tutorial
Microsoft Teams Tutorial
 
Google Hangouts On Air Procedure
Google Hangouts On Air ProcedureGoogle Hangouts On Air Procedure
Google Hangouts On Air Procedure
 
How to take a webinar
How to take a webinarHow to take a webinar
How to take a webinar
 

Ähnlich wie Video Conferencing Security

Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PCStep by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PCAndualem192
 
Video conferencing and its free tools/apps
Video conferencing and its free tools/apps Video conferencing and its free tools/apps
Video conferencing and its free tools/apps Dr. Sarita Anand
 
First Time Video Conferencing
First Time Video ConferencingFirst Time Video Conferencing
First Time Video ConferencingPaul Richards
 
Ntm 2.0 arvola presentation
Ntm 2.0 arvola presentationNtm 2.0 arvola presentation
Ntm 2.0 arvola presentationMilla Granlund
 
Creating engagement in online meetings using zoom
Creating engagement in online meetings using zoomCreating engagement in online meetings using zoom
Creating engagement in online meetings using zoomBrian Pichman
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
Dreamtek guide to video webcasting
Dreamtek guide to video webcastingDreamtek guide to video webcasting
Dreamtek guide to video webcastingDreamtek UK & UAE
 
Web conferencing.....
Web conferencing.....Web conferencing.....
Web conferencing.....pumascomm
 
Technology Tools to increase efficiency in 2020
Technology Tools to increase efficiency in 2020Technology Tools to increase efficiency in 2020
Technology Tools to increase efficiency in 2020Dale Denham
 
The ABC Of Video Marketing
The ABC Of Video MarketingThe ABC Of Video Marketing
The ABC Of Video Marketingmgower
 
Getting the Most Out of Lifesize Cloud
Getting the Most Out of Lifesize CloudGetting the Most Out of Lifesize Cloud
Getting the Most Out of Lifesize CloudLifesize
 
Network Planning Worksheets for Video Conferencing
Network Planning Worksheets for Video ConferencingNetwork Planning Worksheets for Video Conferencing
Network Planning Worksheets for Video ConferencingVideoguy
 
Hosting a virtual party with live trivia
Hosting a virtual party with live triviaHosting a virtual party with live trivia
Hosting a virtual party with live triviaPaul Richards
 
Producing Live Events 
on Zoom
Producing Live Events 
on ZoomProducing Live Events 
on Zoom
Producing Live Events 
on ZoomRichard Harrington
 
Let's go Virtual- Guide to Using Zoom for Rotary Clubs
Let's go Virtual-  Guide to Using Zoom for Rotary ClubsLet's go Virtual-  Guide to Using Zoom for Rotary Clubs
Let's go Virtual- Guide to Using Zoom for Rotary ClubsOperation Warm
 
Webiner Presentation
Webiner PresentationWebiner Presentation
Webiner Presentationo96717393
 
Fun and Creative Ideas to Energize Your Video Conference Meetings
Fun and Creative Ideas to  Energize Your  Video Conference MeetingsFun and Creative Ideas to  Energize Your  Video Conference Meetings
Fun and Creative Ideas to Energize Your Video Conference MeetingsHarriet Davis
 

Ähnlich wie Video Conferencing Security (20)

Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PCStep by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
 
EasyWebMeeting Presentation
EasyWebMeeting PresentationEasyWebMeeting Presentation
EasyWebMeeting Presentation
 
Video conferencing and its free tools/apps
Video conferencing and its free tools/apps Video conferencing and its free tools/apps
Video conferencing and its free tools/apps
 
First Time Video Conferencing
First Time Video ConferencingFirst Time Video Conferencing
First Time Video Conferencing
 
Ntm 2.0 arvola presentation
Ntm 2.0 arvola presentationNtm 2.0 arvola presentation
Ntm 2.0 arvola presentation
 
Creating engagement in online meetings using zoom
Creating engagement in online meetings using zoomCreating engagement in online meetings using zoom
Creating engagement in online meetings using zoom
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Video Conferencing from Home: 9 Mistakes to Avoid
Video Conferencing from Home: 9 Mistakes to AvoidVideo Conferencing from Home: 9 Mistakes to Avoid
Video Conferencing from Home: 9 Mistakes to Avoid
 
Dreamtek guide to video webcasting
Dreamtek guide to video webcastingDreamtek guide to video webcasting
Dreamtek guide to video webcasting
 
Web conferencing.....
Web conferencing.....Web conferencing.....
Web conferencing.....
 
Technology Tools to increase efficiency in 2020
Technology Tools to increase efficiency in 2020Technology Tools to increase efficiency in 2020
Technology Tools to increase efficiency in 2020
 
The ABC Of Video Marketing
The ABC Of Video MarketingThe ABC Of Video Marketing
The ABC Of Video Marketing
 
Getting the Most Out of Lifesize Cloud
Getting the Most Out of Lifesize CloudGetting the Most Out of Lifesize Cloud
Getting the Most Out of Lifesize Cloud
 
Virtual meeting
Virtual meetingVirtual meeting
Virtual meeting
 
Network Planning Worksheets for Video Conferencing
Network Planning Worksheets for Video ConferencingNetwork Planning Worksheets for Video Conferencing
Network Planning Worksheets for Video Conferencing
 
Hosting a virtual party with live trivia
Hosting a virtual party with live triviaHosting a virtual party with live trivia
Hosting a virtual party with live trivia
 
Producing Live Events 
on Zoom
Producing Live Events 
on ZoomProducing Live Events 
on Zoom
Producing Live Events 
on Zoom
 
Let's go Virtual- Guide to Using Zoom for Rotary Clubs
Let's go Virtual-  Guide to Using Zoom for Rotary ClubsLet's go Virtual-  Guide to Using Zoom for Rotary Clubs
Let's go Virtual- Guide to Using Zoom for Rotary Clubs
 
Webiner Presentation
Webiner PresentationWebiner Presentation
Webiner Presentation
 
Fun and Creative Ideas to Energize Your Video Conference Meetings
Fun and Creative Ideas to  Energize Your  Video Conference MeetingsFun and Creative Ideas to  Energize Your  Video Conference Meetings
Fun and Creative Ideas to Energize Your Video Conference Meetings
 

Mehr von Ramesh C. Sharma

Using FREECAM for creating video content, Screen recording and editing
Using FREECAM for creating video content, Screen recording and editingUsing FREECAM for creating video content, Screen recording and editing
Using FREECAM for creating video content, Screen recording and editingRamesh C. Sharma
 
20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp P...
20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp  P...20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp  P...
20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp P...Ramesh C. Sharma
 
A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...
A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...
A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...Ramesh C. Sharma
 
Educación remota de emergencia durante la pandemia Covid-19
Educación remota de emergencia durante la pandemia Covid-19Educación remota de emergencia durante la pandemia Covid-19
Educación remota de emergencia durante la pandemia Covid-19Ramesh C. Sharma
 
20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses
20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses
20210907-ISAGA-Gamified Framework for Educational Simulations in STEM CoursesRamesh C. Sharma
 
20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design
20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design
20210922-ICETOL-Innovative Applications of Online Pedagogy and Course DesignRamesh C. Sharma
 
20210928 Global study on Open Education and Open Science: Practices, use case...
20210928 Global study on Open Education and Open Science: Practices, use case...20210928 Global study on Open Education and Open Science: Practices, use case...
20210928 Global study on Open Education and Open Science: Practices, use case...Ramesh C. Sharma
 
20210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.0
20210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.020210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.0
20210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.0Ramesh C. Sharma
 
Learning Systems for Unlearn and Relearn
Learning Systems for Unlearn and RelearnLearning Systems for Unlearn and Relearn
Learning Systems for Unlearn and RelearnRamesh C. Sharma
 
20210807 Pandemic Diaries: Ripples in Education
20210807 Pandemic Diaries: Ripples in Education20210807 Pandemic Diaries: Ripples in Education
20210807 Pandemic Diaries: Ripples in EducationRamesh C. Sharma
 
20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...
20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...
20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...Ramesh C. Sharma
 
20210623 Digital Technologies and Innovations in Education
20210623 Digital Technologies and Innovations in Education20210623 Digital Technologies and Innovations in Education
20210623 Digital Technologies and Innovations in EducationRamesh C. Sharma
 
Perspective of National Education Policy 2020: Self-Learning as the way Forward
Perspective of National Education Policy 2020: Self-Learning as the way ForwardPerspective of National Education Policy 2020: Self-Learning as the way Forward
Perspective of National Education Policy 2020: Self-Learning as the way ForwardRamesh C. Sharma
 
How to use orcid to build your work and reseach profile
How to use orcid to build your work and reseach profileHow to use orcid to build your work and reseach profile
How to use orcid to build your work and reseach profileRamesh C. Sharma
 
Creating mind map on Online Facilitation
Creating mind map on Online FacilitationCreating mind map on Online Facilitation
Creating mind map on Online FacilitationRamesh C. Sharma
 
How to use Mendeley for Citation and References Management in Research.
How to use Mendeley for Citation and References Management in Research.How to use Mendeley for Citation and References Management in Research.
How to use Mendeley for Citation and References Management in Research.Ramesh C. Sharma
 
Cooperative Learning Pedagogy
Cooperative Learning PedagogyCooperative Learning Pedagogy
Cooperative Learning PedagogyRamesh C. Sharma
 
Reference Management tools for Academic Writing
Reference Management tools for Academic WritingReference Management tools for Academic Writing
Reference Management tools for Academic WritingRamesh C. Sharma
 
Using online graph paper with the help of Google Jamboard
Using online graph paper with the help of Google JamboardUsing online graph paper with the help of Google Jamboard
Using online graph paper with the help of Google JamboardRamesh C. Sharma
 

Mehr von Ramesh C. Sharma (20)

Using FREECAM for creating video content, Screen recording and editing
Using FREECAM for creating video content, Screen recording and editingUsing FREECAM for creating video content, Screen recording and editing
Using FREECAM for creating video content, Screen recording and editing
 
20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp P...
20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp  P...20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp  P...
20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp P...
 
A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...
A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...
A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...
 
Educación remota de emergencia durante la pandemia Covid-19
Educación remota de emergencia durante la pandemia Covid-19Educación remota de emergencia durante la pandemia Covid-19
Educación remota de emergencia durante la pandemia Covid-19
 
20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses
20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses
20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses
 
20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design
20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design
20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design
 
20210928 Global study on Open Education and Open Science: Practices, use case...
20210928 Global study on Open Education and Open Science: Practices, use case...20210928 Global study on Open Education and Open Science: Practices, use case...
20210928 Global study on Open Education and Open Science: Practices, use case...
 
20210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.0
20210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.020210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.0
20210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.0
 
Learning Systems for Unlearn and Relearn
Learning Systems for Unlearn and RelearnLearning Systems for Unlearn and Relearn
Learning Systems for Unlearn and Relearn
 
20210807 Pandemic Diaries: Ripples in Education
20210807 Pandemic Diaries: Ripples in Education20210807 Pandemic Diaries: Ripples in Education
20210807 Pandemic Diaries: Ripples in Education
 
20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...
20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...
20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...
 
20210623 Digital Technologies and Innovations in Education
20210623 Digital Technologies and Innovations in Education20210623 Digital Technologies and Innovations in Education
20210623 Digital Technologies and Innovations in Education
 
Perspective of National Education Policy 2020: Self-Learning as the way Forward
Perspective of National Education Policy 2020: Self-Learning as the way ForwardPerspective of National Education Policy 2020: Self-Learning as the way Forward
Perspective of National Education Policy 2020: Self-Learning as the way Forward
 
How to use orcid to build your work and reseach profile
How to use orcid to build your work and reseach profileHow to use orcid to build your work and reseach profile
How to use orcid to build your work and reseach profile
 
Creating mind map on Online Facilitation
Creating mind map on Online FacilitationCreating mind map on Online Facilitation
Creating mind map on Online Facilitation
 
How to use padlet
How to use padletHow to use padlet
How to use padlet
 
How to use Mendeley for Citation and References Management in Research.
How to use Mendeley for Citation and References Management in Research.How to use Mendeley for Citation and References Management in Research.
How to use Mendeley for Citation and References Management in Research.
 
Cooperative Learning Pedagogy
Cooperative Learning PedagogyCooperative Learning Pedagogy
Cooperative Learning Pedagogy
 
Reference Management tools for Academic Writing
Reference Management tools for Academic WritingReference Management tools for Academic Writing
Reference Management tools for Academic Writing
 
Using online graph paper with the help of Google Jamboard
Using online graph paper with the help of Google JamboardUsing online graph paper with the help of Google Jamboard
Using online graph paper with the help of Google Jamboard
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Video Conferencing Security

  • 2. Exercise Name some of the Video Conference Tools you have used or heard of.
  • 4. Exercise By what method you can guarantee 100% protection from threats while using web conference tools?
  • 5.
  • 6. work-from-home (WFH) Image by Lynette Coulston from Pixabay Vulnerabilities
  • 7. Zoom Bomb: CSUB ASI Board Meeting Breached by Trolls https://www.youtube.com/watch?v=OEs6mdMgAKU
  • 8. Zoom-bombing disrupted a House Oversight Committee meeting https://www.zdnet.com/article/zoom-bombing-disrupted-a-house-oversight-committee-meeting/
  • 10. Video Conferencing Security Best Practices • Is your current video solution is a legacy system, or is more than five years old? A few things that will help you decide if your current system is too big a risk are: • the type of data encryption the system uses; • how callers log in; • and how the system manages data. https://highfive.com/blog/5-steps-for-secure-video-conferencing Outdated System
  • 11. Video Conferencing Security Best Practices • 128-bit Advanced Encryption Standard (AES) protection The keys are automatically generated at the beginning of each video session, and according to research, are so strong, it would take a supercomputer one “billion billion” years to breach a 128-bit AES key. https://highfive.com/blog/5-steps-for-secure-video-conferencing Logically unbreakable
  • 12. Video Conferencing Security Best Practices • single sign-on (SSO) for user authentication SSO credentials are tied to a user’s authorization and entitlements profile, IT can track where, when and how credentials are used https://highfive.com/blog/5-steps-for-secure-video-conferencing it greatly reduces the risk of user credentials being lost, stolen or compromised
  • 13. Video Conferencing Security Best Practices • Domain-based approach to security The first mistake is connecting it directly to the Internet without using a firewall. The second is setting it to automatically answer incoming video calls, which provides remote intruders with easy access. https://highfive.com/blog/5-steps-for-secure-video-conferencing enables the system administrator to control access to video conferences by assigning various levels of permission to users
  • 14. Video Conferencing Security Best Practices • A video conferencing policy • Users must get permission to record a video conference from everyone on the call. • Personal mobile devices should not be used to record video conferences. • Sensitive information should be discussed in designated video conference rooms and not in public places or open office spaces. • Video conferences conducted at a user’s desk should train the camera to focus on the users face, and any visible confidential data should be removed from camera view. • Cameras and microphones should be turned off when not in use. • Remote control of cameras is for authenticated users only. https://highfive.com/blog/5-steps-for-secure-video-conferencing sensitive information, such as hospitals and financial institutions will want to be specific about who users can connect with via video conference
  • 15. Tips for protecting the video conferencing environment Always ensure that meetings are password-protected Don’t share meeting information on public platforms. Use host controls to your advantage. Utilize waiting rooms or lobbies. Notify users if the meeting is being recorded. Disable file transfer features. Always update to the latest version.
  • 16. The host joins first. Tips for protecting the video conferencing environment Lock calls after everyone joins Make sure that every attendee speaks at the start of the call, maybe even on video. It helps deal with isolation and identifies unknown attendees. Prevent the recording of meetings Don’t allow participants to screen share by default.
  • 18. Question = How does Google Meet, Microsoft Teams and Zoom differ in their approach? Microsoft Teams and Google Meet require users to have accounts with them, whereas Zoom allows users to participate using their web browsers.
  • 19. Google Meet (previously known as Google Hangouts Meet ) • Google's Multi-layered security • Meet has no need for frequent security patches, simply because the application works fully in your browser. • Google Meet supports the same robust privacy commitments and data protections as the rest of Google Cloud’s enterprise services. • In G Suite Enterprise and G Suite for Education, customers can use additional advanced security functionalities like Access Transparency. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 20. Google Meet Features • Meet doesn’t have user attention-tracking features or software. • All data in Google Meet is encrypted in transit by default between the client and Google for video meetings on a web browser, on the Android and iOS apps, and in meeting rooms with Google meeting room hardware. • All Meet recorded meetings are stored in Google Drive and get encrypted by default, like all data that you store in Drive. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 21. Google Meet Features • To secure your online meetings further, Google has taken several anti-intruder measures to make sure your video meetings are safe from unwanted guests. These include anti-hijacking measures for both web video meetings and telephony dial-ins. • The way Google Meet works, guests can enter video meetings via a simple meeting link in the browser or Meet app. Very convenient, but is this safe? Yes it is! Google makes it nearly impossible for external people with bad intentions to crack your video meeting IDs programmatically. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 22. Avoiding unwanted guests with secure meeting IDs • Google Meet meeting codes are 10 characters long, with 25 characters in the set. This makes it impossible for outsiders to “guess” meeting codes and join an internal video meeting that way. • Pro tip: pay attention not to share your meeting links to externals that don’t need to get access to your video meetings. This could for example happen when you share a screenshot of your meeting room where the meeting link is visible in the browser. These days a lot of companies are sharing such screenshots on LinkedIn to show how they stay in touch with their employees. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 23. Mitigating External participants risk through identified meeting links • External participants from outside the host’s domain can join a video meeting directly with the encrypted link. But they can do this only if they are on the Calendar invite for this video meeting, or if they have been invited by in- domain participants from the Google Meet session. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 24. Mitigating External participants risk through identified meeting links • Any other external participants must request to join the meeting, and this request must be accepted by a member of the host organisation of the meeting before this person can actually enter the meeting. Unexpected or unwanted meeting guests can simply be refused to enter the meeting by one of the meeting hosts. • In addition to that measure, Google also makes it impossible for externals to join a scheduled video meeting in Google Meet more than 15 minutes before the meeting actually starts. This is reducing even more the opportunity window for malicious ‘meeting-bombers’ to attempt to break in your video meeting. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 25. Good practices for Google Meet • Only meeting creators and calendar owners can mute or remove other participants. This ensures that instructors can't be removed or muted by student participants. • Only meeting creators and calendar owners can approve requests to join made by external participants. This means that students can’t allow external participants to join via video, and that external participants can’t join before the instructor. • Meeting participants can’t rejoin nicknamed meetings once the final participant has left. This means if the instructor is the last person to leave a nicknamed meeting, students can’t join later without the instructor present.