SlideShare a Scribd company logo
1 of 6
You need to analyze the features of three videoconferencing
systems and provide an overview of each system. After you
complete the overview of the systems, you'll recommend a
system which best meets the business functionality and security
requirements. You will also prepare a set of high level
executive briefing slides to give the CEO and CIO an overview
of your study. Your study and recommendation will be critical
to the company's success.
Cybersecurity professionals are frequently required to assess the
security, risk applications, and systems for business
communications before they can be added to an organization's
network. CISOs need to assess risks posed to the organization
and develop new security measures or adjust current measures
to address these risks appropriately. These evaluations involve
comparing competing applications or systems against the
organization's baseline to determine the best balance between
business needs and the security and risk appetite of the
organization.
Videoconferencing and collaboration systems vary in cost,
configuration, functionality, use, and collaboration capability.
These systems are trusted to facilitate sensitive and proprietary
discussions through their use of encrypted communication
channels. Yet these systems have vulnerabilities and are prone
to threats and attacks ranging from phishing, credential
compromise, and even malware insertion. Therefore, analysis of
possible threats, attacks, and vulnerabilities inherent in these
systems is critical in developing defense and protection
strategies for voice and video data at all endpoints and during
transit.
In this project, you will create a proposal for a secure
videoconferencing system, which will include an executive
summary, briefing/slide presentation, and lab report. The details
can be found in the final step of the project.
There are six steps to the project, and the project as a whole
should take about two weeks to complete. Begin with the
workplace scenario and then continue to Step 1.
Deliverables
Proposal for Secure Videoconferencing, Slides to Support
Executive Briefing, Lab Report
Step 1: Develop Functional Requirements for
Videoconferencing
The first step in your proposal for a secure videoconferencing
system is to develop a set of functional requirements for
videoconferencing that you believe the media company will
need based on its geographic dispersion and business needs.
In developing those requirements, research three
videoconferencing solutions such as Skype, GotoMeeting,
Polycom, and Cisco Webex and explain their capabilities,
advantages, and disadvantages. Identify costs as well as
implementation and support requirements.
The functional requirements and the three possible solutions
will be a section of your Proposal for Secure
Videoconferencing. In the next step, you will review the
challenges of implementing those solutions.
Step 2: Discuss Implementation Challenges
In the previous step, you outlined the requirements for secure
videoconferencing for the company and outlined three potential
solutions. Part of your final proposal should also include the
advantages and disadvantages of the implementation options for
the three systems you selected. This section of the proposal also
must include the changes the media company will need to make
to implement the systems.
Additionally, explain how system administration or privileged
identity management will operate with these systems. You will
also need to examine how data exfiltration will occur with each
of the new systems.
The changes to the systems and challenges for the
implementation of these potential solutions will be an important
section of your Proposal for Secure Videoconferencing. In the
next step, you will take a closer look at the track records of
each of the potential videoconferencing vendors.
Step 3: Identify Vendor Risks
You've finished outlining the pros and cons of three
videoconferencing systems. Now, it's time to take a close look
at how they serve their clients. This will take some research.
Look at the systems' known vulnerabilities and exploits.
Examine and explain the past history of each vendor with
normal notification timelines, release of patches, or work-
arounds (solutions within the system without using a patch).
Your goal is to know the timeliness of response with each
company in helping customers stay secure.
This step will be a section of your Proposal for Secure
Videoconferencing.
In the next step, you will outline best practices for secure
videoconferencing that will be part of your overall proposal to
management.
Step 4: Develop Best Practices for Secure Videoconferencing
The last few steps have been devoted to analyzing potential
videoconferencing solutions. But obtaining a trusted vendor is
just part of the security efforts. Another important step is to
ensure that users and system administrators conduct the
company's videoconferencing in a secure manner. In this step,
outline security best practices for videoconferencing that you
would like users and systems administrators to follow. Discuss
how these best practices will improve security and minimize
risks of data exfiltration as well as snooping.
This "best practices" section will be part of the overall Proposal
for Secure Videoconferencing.
In the next step, you will develop system integrity checks
within a virtual lab environment.
Step 5: Develop System Integrity Checks
As part of the overall proposal, the CISO has asked you to
develop system integrity checks for files shared between users
of the videoconferencing systems. These checks will ensure file
protection and prevent exfiltration of sensitive files.
The lab exercise will show how this is done. In this step, you
will generate a lab report that will be part of your final
assignment. The lab instructions will tell you what the report
needs to contain.
Complete This Lab
Here are some resources that will help you complete the lab:
Accessing the Virtual Lab Environment:
Navigating the Workspace and the Lab Setup
.
Review the
Workspace and Lab Machine Environment Tutorial
Lab Instructions:
Yara Lab Exercise
Self-Help Guide:
Workspace: Getting Started and Troubleshooting
Expand side panelCollapse side panel
Project 1: Risk, Threat, and Vulnerability ManagementProject
2: Incident ResponseProject 3: Enterprise Network
SecurityProject 4: Secure Videoconferencing Communications
Start Here
Step 1: Develop Functional Requirements for
Videoconferencing
Step 2: Discuss Implementation Challenges
Step 3: Identify Vendor Risks
Step 4: Develop Best Practices for Secure Videoconferencing
Step 5: Develop System Integrity Checks
Step 6: Submit Your Proposal for Secure Videoconferencing and
All Related Materials
Project 5: Data Loss Prevention (Group Project)
Step 6: Submit Your Proposal for Secure Videoconferencing and
All Related Materials
It's time to prepare your materials on secure videoconferencing
for management. Your task is to recommend a system that best
meets the business functionality and security requirements of
the company. As part of that recommendation, you will also
prepare a set of high-level executive briefing slides to give the
CEO and CIO an overview of your study.
The assignments for this project are as follows:
Executive briefing: This is a three- to five-slide visual
presentation for business executives and board members.
Executive summary: This is a one-page summary at the
beginning of your Proposal for Secure Videoconferencing.
Proposal for Secure Videoconferencing: Your report should be a
minimum six-page double-spaced Word document with citations
in APA format. The page count does not include figures,
diagrams, tables or citations.
Lab report: Generated from Workspace.
Submit all four components to the assignment folder.

More Related Content

Similar to You need to analyze the features of three videoconferencing systems

CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comagathachristie113
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsCheckmarx
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comBaileyabw
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident responsepersons20ar
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.comDavisMurphyA97
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comdonaldzs8
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comPrescottLunt385
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comrobertlesew6
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comDavis11a
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxwkyra78
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comMcdonaldRyan79
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comamaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comamaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comamaranthbeg73
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident responsepersons20ar
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident responsepersons20ar
 

Similar to You need to analyze the features of three videoconferencing systems (20)

CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.com
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 

More from walthamcoretta

If overload does not get you, underload might. People are not ever b.docx
If overload does not get you, underload might. People are not ever b.docxIf overload does not get you, underload might. People are not ever b.docx
If overload does not get you, underload might. People are not ever b.docxwalthamcoretta
 
If we sensed and attended equally to each stimulus in the world, the.docx
If we sensed and attended equally to each stimulus in the world, the.docxIf we sensed and attended equally to each stimulus in the world, the.docx
If we sensed and attended equally to each stimulus in the world, the.docxwalthamcoretta
 
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docxIf Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docxwalthamcoretta
 
If machine 2 was purchased on April 1 instead of July 1, what would .docx
If machine 2 was purchased on April 1 instead of July 1, what would .docxIf machine 2 was purchased on April 1 instead of July 1, what would .docx
If machine 2 was purchased on April 1 instead of July 1, what would .docxwalthamcoretta
 
If I Had Been the Attorney of Record Then...For this Written Assig.docx
If I Had Been the Attorney of Record Then...For this Written Assig.docxIf I Had Been the Attorney of Record Then...For this Written Assig.docx
If I Had Been the Attorney of Record Then...For this Written Assig.docxwalthamcoretta
 
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docxIf the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docxwalthamcoretta
 
Identifytwo barriers that influence your critical thinking.Inc.docx
Identifytwo barriers that influence your critical thinking.Inc.docxIdentifytwo barriers that influence your critical thinking.Inc.docx
Identifytwo barriers that influence your critical thinking.Inc.docxwalthamcoretta
 
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docxIf using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docxwalthamcoretta
 
Identifying OpportunitiesSelect a company which is described in re.docx
Identifying OpportunitiesSelect a company which is described in re.docxIdentifying OpportunitiesSelect a company which is described in re.docx
Identifying OpportunitiesSelect a company which is described in re.docxwalthamcoretta
 
Identifying and responding effectively to grant proposals is more an.docx
Identifying and responding effectively to grant proposals is more an.docxIdentifying and responding effectively to grant proposals is more an.docx
Identifying and responding effectively to grant proposals is more an.docxwalthamcoretta
 
Identify the research problem.Identify the research purpose.Summ.docx
Identify the research problem.Identify the research purpose.Summ.docxIdentify the research problem.Identify the research purpose.Summ.docx
Identify the research problem.Identify the research purpose.Summ.docxwalthamcoretta
 
Identify two analytical tools used to process data collection..docx
Identify two analytical tools used to process data collection..docxIdentify two analytical tools used to process data collection..docx
Identify two analytical tools used to process data collection..docxwalthamcoretta
 
Identify two different examples (one positive and one negative) of.docx
Identify two different examples (one positive and one negative) of.docxIdentify two different examples (one positive and one negative) of.docx
Identify two different examples (one positive and one negative) of.docxwalthamcoretta
 
Identify three (3) Websites that you plan to use for your research o.docx
Identify three (3) Websites that you plan to use for your research o.docxIdentify three (3) Websites that you plan to use for your research o.docx
Identify three (3) Websites that you plan to use for your research o.docxwalthamcoretta
 
Identify the four basic financial statements.Describe the purpos.docx
Identify the four basic financial statements.Describe the purpos.docxIdentify the four basic financial statements.Describe the purpos.docx
Identify the four basic financial statements.Describe the purpos.docxwalthamcoretta
 
Identify Funding OpportunityAfter you have completed your public h.docx
Identify Funding OpportunityAfter you have completed your public h.docxIdentify Funding OpportunityAfter you have completed your public h.docx
Identify Funding OpportunityAfter you have completed your public h.docxwalthamcoretta
 
Identify at least two (2) factors that have led to the explosive gro.docx
Identify at least two (2) factors that have led to the explosive gro.docxIdentify at least two (2) factors that have led to the explosive gro.docx
Identify at least two (2) factors that have led to the explosive gro.docxwalthamcoretta
 
Identify two (2) classical Greek and or Roman figures or qualities.docx
Identify two (2) classical Greek and  or Roman figures or qualities.docxIdentify two (2) classical Greek and  or Roman figures or qualities.docx
Identify two (2) classical Greek and or Roman figures or qualities.docxwalthamcoretta
 
Identify the subject and the verb1. Te angry student dropped the c.docx
Identify the subject and the verb1. Te angry student dropped the c.docxIdentify the subject and the verb1. Te angry student dropped the c.docx
Identify the subject and the verb1. Te angry student dropped the c.docxwalthamcoretta
 
Identify and describe a historical event in which the deindividuatio.docx
Identify and describe a historical event in which the deindividuatio.docxIdentify and describe a historical event in which the deindividuatio.docx
Identify and describe a historical event in which the deindividuatio.docxwalthamcoretta
 

More from walthamcoretta (20)

If overload does not get you, underload might. People are not ever b.docx
If overload does not get you, underload might. People are not ever b.docxIf overload does not get you, underload might. People are not ever b.docx
If overload does not get you, underload might. People are not ever b.docx
 
If we sensed and attended equally to each stimulus in the world, the.docx
If we sensed and attended equally to each stimulus in the world, the.docxIf we sensed and attended equally to each stimulus in the world, the.docx
If we sensed and attended equally to each stimulus in the world, the.docx
 
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docxIf Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
 
If machine 2 was purchased on April 1 instead of July 1, what would .docx
If machine 2 was purchased on April 1 instead of July 1, what would .docxIf machine 2 was purchased on April 1 instead of July 1, what would .docx
If machine 2 was purchased on April 1 instead of July 1, what would .docx
 
If I Had Been the Attorney of Record Then...For this Written Assig.docx
If I Had Been the Attorney of Record Then...For this Written Assig.docxIf I Had Been the Attorney of Record Then...For this Written Assig.docx
If I Had Been the Attorney of Record Then...For this Written Assig.docx
 
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docxIf the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
 
Identifytwo barriers that influence your critical thinking.Inc.docx
Identifytwo barriers that influence your critical thinking.Inc.docxIdentifytwo barriers that influence your critical thinking.Inc.docx
Identifytwo barriers that influence your critical thinking.Inc.docx
 
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docxIf using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
 
Identifying OpportunitiesSelect a company which is described in re.docx
Identifying OpportunitiesSelect a company which is described in re.docxIdentifying OpportunitiesSelect a company which is described in re.docx
Identifying OpportunitiesSelect a company which is described in re.docx
 
Identifying and responding effectively to grant proposals is more an.docx
Identifying and responding effectively to grant proposals is more an.docxIdentifying and responding effectively to grant proposals is more an.docx
Identifying and responding effectively to grant proposals is more an.docx
 
Identify the research problem.Identify the research purpose.Summ.docx
Identify the research problem.Identify the research purpose.Summ.docxIdentify the research problem.Identify the research purpose.Summ.docx
Identify the research problem.Identify the research purpose.Summ.docx
 
Identify two analytical tools used to process data collection..docx
Identify two analytical tools used to process data collection..docxIdentify two analytical tools used to process data collection..docx
Identify two analytical tools used to process data collection..docx
 
Identify two different examples (one positive and one negative) of.docx
Identify two different examples (one positive and one negative) of.docxIdentify two different examples (one positive and one negative) of.docx
Identify two different examples (one positive and one negative) of.docx
 
Identify three (3) Websites that you plan to use for your research o.docx
Identify three (3) Websites that you plan to use for your research o.docxIdentify three (3) Websites that you plan to use for your research o.docx
Identify three (3) Websites that you plan to use for your research o.docx
 
Identify the four basic financial statements.Describe the purpos.docx
Identify the four basic financial statements.Describe the purpos.docxIdentify the four basic financial statements.Describe the purpos.docx
Identify the four basic financial statements.Describe the purpos.docx
 
Identify Funding OpportunityAfter you have completed your public h.docx
Identify Funding OpportunityAfter you have completed your public h.docxIdentify Funding OpportunityAfter you have completed your public h.docx
Identify Funding OpportunityAfter you have completed your public h.docx
 
Identify at least two (2) factors that have led to the explosive gro.docx
Identify at least two (2) factors that have led to the explosive gro.docxIdentify at least two (2) factors that have led to the explosive gro.docx
Identify at least two (2) factors that have led to the explosive gro.docx
 
Identify two (2) classical Greek and or Roman figures or qualities.docx
Identify two (2) classical Greek and  or Roman figures or qualities.docxIdentify two (2) classical Greek and  or Roman figures or qualities.docx
Identify two (2) classical Greek and or Roman figures or qualities.docx
 
Identify the subject and the verb1. Te angry student dropped the c.docx
Identify the subject and the verb1. Te angry student dropped the c.docxIdentify the subject and the verb1. Te angry student dropped the c.docx
Identify the subject and the verb1. Te angry student dropped the c.docx
 
Identify and describe a historical event in which the deindividuatio.docx
Identify and describe a historical event in which the deindividuatio.docxIdentify and describe a historical event in which the deindividuatio.docx
Identify and describe a historical event in which the deindividuatio.docx
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

You need to analyze the features of three videoconferencing systems

  • 1. You need to analyze the features of three videoconferencing systems and provide an overview of each system. After you complete the overview of the systems, you'll recommend a system which best meets the business functionality and security requirements. You will also prepare a set of high level executive briefing slides to give the CEO and CIO an overview of your study. Your study and recommendation will be critical to the company's success. Cybersecurity professionals are frequently required to assess the security, risk applications, and systems for business communications before they can be added to an organization's network. CISOs need to assess risks posed to the organization and develop new security measures or adjust current measures to address these risks appropriately. These evaluations involve comparing competing applications or systems against the organization's baseline to determine the best balance between business needs and the security and risk appetite of the organization. Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. These systems are trusted to facilitate sensitive and proprietary discussions through their use of encrypted communication channels. Yet these systems have vulnerabilities and are prone to threats and attacks ranging from phishing, credential compromise, and even malware insertion. Therefore, analysis of possible threats, attacks, and vulnerabilities inherent in these systems is critical in developing defense and protection strategies for voice and video data at all endpoints and during transit. In this project, you will create a proposal for a secure videoconferencing system, which will include an executive summary, briefing/slide presentation, and lab report. The details
  • 2. can be found in the final step of the project. There are six steps to the project, and the project as a whole should take about two weeks to complete. Begin with the workplace scenario and then continue to Step 1. Deliverables Proposal for Secure Videoconferencing, Slides to Support Executive Briefing, Lab Report Step 1: Develop Functional Requirements for Videoconferencing The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs. In developing those requirements, research three videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco Webex and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements. The functional requirements and the three possible solutions will be a section of your Proposal for Secure Videoconferencing. In the next step, you will review the challenges of implementing those solutions. Step 2: Discuss Implementation Challenges In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for
  • 3. the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems. Additionally, explain how system administration or privileged identity management will operate with these systems. You will also need to examine how data exfiltration will occur with each of the new systems. The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your Proposal for Secure Videoconferencing. In the next step, you will take a closer look at the track records of each of the potential videoconferencing vendors. Step 3: Identify Vendor Risks You've finished outlining the pros and cons of three videoconferencing systems. Now, it's time to take a close look at how they serve their clients. This will take some research. Look at the systems' known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work- arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure. This step will be a section of your Proposal for Secure Videoconferencing. In the next step, you will outline best practices for secure videoconferencing that will be part of your overall proposal to management. Step 4: Develop Best Practices for Secure Videoconferencing
  • 4. The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company's videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping. This "best practices" section will be part of the overall Proposal for Secure Videoconferencing. In the next step, you will develop system integrity checks within a virtual lab environment. Step 5: Develop System Integrity Checks As part of the overall proposal, the CISO has asked you to develop system integrity checks for files shared between users of the videoconferencing systems. These checks will ensure file protection and prevent exfiltration of sensitive files. The lab exercise will show how this is done. In this step, you will generate a lab report that will be part of your final assignment. The lab instructions will tell you what the report needs to contain. Complete This Lab Here are some resources that will help you complete the lab: Accessing the Virtual Lab Environment:
  • 5. Navigating the Workspace and the Lab Setup . Review the Workspace and Lab Machine Environment Tutorial Lab Instructions: Yara Lab Exercise Self-Help Guide: Workspace: Getting Started and Troubleshooting Expand side panelCollapse side panel Project 1: Risk, Threat, and Vulnerability ManagementProject 2: Incident ResponseProject 3: Enterprise Network SecurityProject 4: Secure Videoconferencing Communications Start Here Step 1: Develop Functional Requirements for Videoconferencing Step 2: Discuss Implementation Challenges Step 3: Identify Vendor Risks Step 4: Develop Best Practices for Secure Videoconferencing Step 5: Develop System Integrity Checks Step 6: Submit Your Proposal for Secure Videoconferencing and All Related Materials Project 5: Data Loss Prevention (Group Project) Step 6: Submit Your Proposal for Secure Videoconferencing and All Related Materials It's time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best
  • 6. meets the business functionality and security requirements of the company. As part of that recommendation, you will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study. The assignments for this project are as follows: Executive briefing: This is a three- to five-slide visual presentation for business executives and board members. Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing. Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. Lab report: Generated from Workspace. Submit all four components to the assignment folder.