I’m working on a cyber security exercise and need support to help me learn.

Posted: June 8th, 2022

Place your order now for a similar assignment and have exceptional work written by our team of experts, At affordable rates

For This or a Similar Paper Click To Order Now

Learning Goal: I’m working on a cyber security exercise and need support to help me learn. I need a document with the below details: Title : Zoom/Teams and Conference SW Security and Open Source Conference Systems Problem need to be discussed: Privacy issues in Zoom/Teams and Open Source Conference Systems Abstract An abstract is a short informative summary that briefly describes the problem, summarizes the main argument, the research methods and procedures and lists the main findings and conclusions. Remember to keep it brief, normally an abstract must not exceed 500 words in the case of a thesis and 300 words in the case of a dissertation. This summary must appear in the front of the dissertation or thesis following the table of content and must end with a list of not more than ten key words. Methods and the materials The research methodology will explain to your reader the methods you used to gather the information and data for your paper to answer your research question, almost like a recipe. This chapter is regarded as the core of the dissertation or thesis as an error or weakness in this explanation can invalidate the findings, dooming the study as a whole. This chapter is often scrutinized very critically by other scientists, and weigh heavily in examining. Start the chapter with a clear explanation of the methodology that will be used to solve the problem (a framework diagram is a must here to support your methodology).
Provide a detailed description of the components of the methodology.
Describe what the methods are all about and how you have executed the methodology. It should be clear why you choose to use this specific methodology for answering your research question
Use at least 4 tables & 4 figures.
The responses should be 14 pages in length, not including the title or reference pages and using APA style guidelines,
-References: The references should not before 2019 and not in the list below please :
Aiken, A. (2020). Zooming in on privacy concerns: Video app Zoom is surging in popularity. In our rush to stay connected, we need to make security checks and not reveal more than we think. Index on Censorship, 49(2), 24-27. Botha, R., & Furnell, S. (2021). Facing up to security and privacy in online meetings. Network Security, 2021(5), 7-13. Botacin, M., Judd, M., Lange, A., Li, T. C., & Salathé, M. (2021). Does Your Threat Model Consider Country and Culture? A Case Study of Brazilian Internet Banking Security to Show That It Should!. Čižmešija, A., & Bubaš, G. (2020). An instrument for evaluating the use of the web conferencing system BigBlueButton in e-learning. In Central European Conference on Information and Intelligent Systems (pp. 63-71). Faculty of Organization and Informatics Varazdin. DJEKI, E., DEGILA, J., BONDIOMBOUY, C., & ALHASSAN, M. H. (2021, November). Security Issues in Digital Learning Spaces. In 2021 IEEE International Conference on Computing (ICOCO) (pp. 71-77). IEEE. Retrieved from; https://ieeexplore.ieee.org/abstract/document/9673575 Hakak, S., Khan, W. Z., Imran, M., Choo, K. K. R., & Shoaib, M. (2020). Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies. Ieee Access, 8, 124134-124144. Isobe, T., & Ito, R. (2021). Security Analysis of End-to-End Encryption for Zoom Meetings. IACR Cryptol. ePrint Arch., 2021, 486. Retrieved from; https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9462825 Kagan, D., Alpert, G. F., & Fire, M. (2020). Zooming into video conferencing privacy and security threats. arXiv preprint arXiv:2007.01059.‏ Mahr, A., Cichon, M., Mateo, S., Grajeda, C., & Baggili, I. (2021). Zooming into the pandemic! A forensic analysis of the Zoom Application. Forensic Science International: Digital Investigation, 36, 301107. Mohanty, M., & Yaqub, W. (2020, September). Seamless authentication for online teaching and meeting. In 2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM) (pp. 120-124). IEEE. Singh, J., & Chaudhary, N. K. (2022). OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities. Journal of Information Security and Applications, 65, 103091. Singh, R., & Awasthi, S. (2020). Updated comparative analysis on video conferencing platforms-zoom, Google meet, Microsoft Teams, WebEx Teams, and GoToMeeting. EasyChair Preprint, 4026, 1-9.
Requirements: 14 pages

For This or a Similar Paper Click To Order Now

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price: