Develop best practices for secure videoconferencing

Assignment Help Computer Network Security
Reference no: EM131992966 , Length:

The assignments for this project are as follows:

Executive briefing: This is a three- to five-slide visual presentation for business executives and board members.

Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing.

Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format.Proposal for Secure Videoconferencing, Slides to Support Executive Briefing, Lab Report

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.
1.4: Tailor communications to the audience.
1.5: Use sentence structure appropriate to the task, message and audience.
1.6: Follow conventions of Standard Written English.
1.7: Create neat and professional looking documents appropriate for the project.
1.8: Create clear oral messages.

2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
2.2: Locate and access sufficient information to investigate the issue or problem.
2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
2.4: Consider and analyze information in context to the issue or problem.
2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
5.6: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology.
5.7: Apply proven methods to secure telecommunications media, transmission, and protocol.
6.3: Specify security solutions based on knowledge of principles, procedures, & tools of data mgmt, such as modeling techniques, data backup, data recovery, data directories, data warehousing, data mining, data disposal, & data standardization processes.
7.3: Knowledge of methods and tools used for risk management and mitigation of risk.
7.4: Knowledge of policies, processes, & technologies used to create a balanced approach to identifying and assessing risks to information assets, personnel, facilities, & equipment, and to manage affordable mitigation strategies that meet security needs.
8.6: Provides professional preparation for computer digital forensics, investigation of crime, and preservation of digital evidence in criminal and civil investigations and information security incident response.
9.4: Manages and supports the acquisition life cycle and cybersecurity products used in the organization's design, development, and maintenance of its infrastructure to minimize potential risks and vulnerabilities.

Step 1: Develop Functional Requirements for Videoconferencing

- The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs.

- In developing those requirements, research three videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco Webex and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements.

- The functional requirements and the three possible solutions will be a section of your Proposal for Secure Videoconferencing. In the next step, you will review the challenges of implementing those solutions.

Step 2: Discuss Implementation Challenges
In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems.
Additionally, explain how system administration or privileged identity managementwill operate with these systems. You will also need to examine how data exfiltrationwill occur with each of the new systems.

The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your Proposal for Secure Videoconferencing. In the next step, you will take a closer look at the track records of each of the potential videoconferencing vendors.

Step 3: Identify Vendor Risks

You've finished outlining the pros and cons of three videoconferencing systems. Now, it's time to take a close look at how they serve their clients. This will take some research. Look at the systems' known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work-arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure.

This step will be a section of your Proposal for Secure Videoconferencing.

In the next step, you will outline best practices for secure videoconferencing that will be part of your overall proposal to management.

Step 4: Develop Best Practices for Secure Videoconferencing

The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company's videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping.
This "best practices" section will be part of the overall Proposal for Secure Videoconferencing.

Step 5: Develop System Integrity Checks

As part of the overall proposal, the CISO has asked you to develop system integrity checks for files shared between users of the videoconferencing systems. These checks will ensure file protection and prevent exfiltration of sensitive files.

The lab exercise will show how this is done. In this step, you will generate a lab report that will be part of your final assignment. The lab instructions will tell you what the report needs to contain.

Step 6: Submit Your Proposal for Secure Videoconferencing and All Related Materials

It's time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best meets the business functionality and security requirements of the company. As part of that recommendation, you will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study.

The assignments for this project are as follows:

1. Executive briefing: This is a three- to five-slide visual presentation for business executives and board members.

2. Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing.

3. Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.

4. Lab report: Generated from Workspace.

Attachment:- Project.zip

Verified Expert

This assignment is related to the demonstration of Video Conferencing concepts. There is a case study related to Video Conferencing. Along with the case study there is a power point presentation. There are three- to five-slide visual presentation for business executives and board members.

Reference no: EM131992966

Questions Cloud

Compare the main strengths of the gantt chart and pert : Compare the main strengths and weaknesses of the Gantt chart and PERT for project management, and give your opinion on which you believe is the most effective.
What do these two quotes mean : 1. "Retailers want to know more about their costumers, yet their customers are wary of providing more information about themselves because
Conduct a design of experiment in order to test cause : Conduct a design of experiment (DOE) in order to test cause-and-effect relationships in business processes for the company.
Assuming market is in equilibrium : Assuming the market is in equilibrium, what does the market believe will be the stock's price at the end of 3 years.
Develop best practices for secure videoconferencing : CST 630 - Develop Best Practices for Secure Videoconferencing - Develop Functional Requirements for Videoconferencing - you will generate a lab report
Describe how understand professionalism : Describe how you understand professionalism. Please include all possible scenarios such as communication, attire, body language, and conflict resolution.
How do banks help expand and maintain the economy : How do banks help expand and maintain the economy? What has been the effect of competition between banks? Why are banks regulated and protected by government
Appreciation of literature is limited by his gender and race : Arguments against Bloom's Canon is that Bloom is a white man whose appreciation of literature is limited by his gender and race.
Determine a down payment : Determine a down payment. (a standard down payment is 20%, however you may offer justification for any amount/percent you choose)

Reviews

len1992966

5/23/2018 2:06:44 AM

The assignments for this project are as follows: Executive briefing: This is a three- to five-slide visual presentation for business executives and board members. Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing. Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. Lab report: Generated from Workspace.

Write a Review

Computer Network Security Questions & Answers

  What do the terms slash dotted and flash crowd refer to

What do the terms slash dotted and flash crowd refer to? What is the relation between these instances of legitimate network overload and the consequences?

  Article about network security

Write a 1 Page summary on an article about network security

  Future threats to network security - research paper

Deliver a research paper and presentation based on your research - Future threats to network security and planning for those threats

  What edition of windows will be used for each server

How many total servers are needed? Which roles will be combined? What edition of Windows will be used for each server (e.g., Standard, Datacenter)? Will Server Core be used on any servers? Where are each of the servers located..

  Discuss specific malware and social engineer attacks

Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Develop a network security policy for a global organization

Develop a network security policy for a global organization. The security was violated in different situations. There are various elements in which need to be discussed and researched to design and outline the policy.

  Write a succinct policy statement specifying employee

Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company?

  Geen computing is the study and practice of ecofriendly

1 green computing is the study and practice of ecofriendly computing resources. green computing is often seen

  Demonstrate the various ways to secure a server installation

Demonstrate the various ways to secure a server installation. Explain ongoing monitoring and management of a server installation.

  What are the steps to successful implementation

What are the steps to successful implementation and what is AI & ML doing for business today and what will it deliver in the future

  How their software is in fact not high assurance software

How would you explain to this company how their software is in fact not high assurance" software?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd