CST 630 UMUC Functional Requirements for Videoconferencing Presentation

User Generated

nynb

Computer Science

CST 630

University of Maryland Global Campus

CST

Description

Cybersecurity professionals are frequently required to assess the security, risk applications, and systems for business communications before they can be added to an organization's network. CISOs need to assess risks posed to the organization and develop new security measures or adjust current measures to address these risks appropriately. These evaluations involve comparing competing applications or systems against the organization's baseline to determine the best balance between business needs and the security and risk appetite of the organization.

Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. These systems are trusted to facilitate sensitive and proprietary discussions through their use of encrypted communication channels. Yet these systems have vulnerabilities and are prone to threats and attacks ranging from phishing, credential compromise, and even malware insertion. Therefore, analysis of possible threats, attacks, and vulnerabilities inherent in these systems is critical in developing defense and protection strategies for voice and video data at all endpoints and during transit.

In this project, you will present your proposal in the form of a narrated slide deck. Be sure to refer to Guidelines for Presentation on Secure Videoconferencing

Step 1: Develop Functional Requirements for Videoconferencing

The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs.

In developing those requirements, research three videoconferencing solutions such as Zoom, Skype, GotoMeeting, Polycom, and Cisco WebEx and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements.

The functional requirements and the three possible solutions will be a section of your proposal. In the next step, you will review the challenges of implementing those solutions.

Step 2: Discuss Implementation Challenges

In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems.

Additionally, explain how system administration or privileged identity management will operate with these systems. You will also need to examine how data exfiltration will occur with each of the new systems.

The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your proposal. In the next step, you will take a closer look at each of the potential videoconferencing vendors.

Step 3: Identify Vendor Risks

You've finished outlining the pros and cons of three videoconferencing systems. Now, it's time to take a close look at how they serve their clients. This will take some research. Look at the systems' known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work-arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure.

This step will be a section of your proposal.

In the next step, you will outline best practices for secure videoconferencing that will be part of your overall proposal.

Step 4: Develop Best Practices for Secure Videoconferencing

The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company's videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping.

This "best practices" section will be part of the overall proposal.

Step 6: Submit Your Proposal for Secure Videoconferencing and All Related Materials

It's time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best meets the business functionality and security requirements of the company. Refer to this guidance on asynchronous presentations and Guidelines for Presentation on Secure Videoconferencing.

 for this project are as follows:

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey buddy, am through. Check it out. Thanks.

SECURE
VIDEOCONFERENCING
Functional Requirements for
Videoconferencing
Name

26/08/2020
Instructor Name

FUNCTIONAL REQUIREMENTS FOR
VIDEOCONFERENCING
• Development of a set of functional requirements
• Three videoconferencing solutions;
• Zoom,
• Skype, and
• Cisco WebEx

• Identify costs

• Implementation and support requirements

FUNCTIONAL REQUIREMENTS FOR
VIDEOCONFERENCING-ZOOM
Features of Zoom
• Zoom Conferencing- real-time content sharing and
messaging.
• Zoom Chat & Zoom Meeting- send files and share content
• Zoom Video Recordings up to 100 participants
• Maximum Number of Participants Up to 500 Participants

ADVANTAGES AND DISADVANTAGES
OF ZOOM
Advantages
• On-screen whiteboard feature enables brainstorming sessions

• supports co-annotation on shared interfaces
...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags