SlideShare a Scribd company logo
Video Conferencing Tools
Exercise
Name some of the
Video Conference
Tools you have
used or heard of.
Video Conferencing Tools
Exercise
By what method you can guarantee
100% protection from threats while
using web conference tools?
20210112 web conferencing tools
work-from-home (WFH)
Image by Lynette Coulston from Pixabay
Vulnerabilities
Zoom Bomb: CSUB ASI Board Meeting
Breached by Trolls
https://www.youtube.com/watch?v=OEs6mdMgAKU
Zoom-bombing disrupted a House
Oversight Committee meeting
https://www.zdnet.com/article/zoom-bombing-disrupted-a-house-oversight-committee-meeting/
https://cyberhoot.com/cybrary/zoom-bombing/
Video Conferencing Security Best
Practices
• Is your current video solution is
a legacy system, or is more than
five years old?
A few things that will help you
decide if your current system is
too big a risk are:
• the type of data encryption the
system uses;
• how callers log in;
• and how the system manages
data.
https://highfive.com/blog/5-steps-for-secure-video-conferencing
Outdated System
Video Conferencing Security Best
Practices
• 128-bit Advanced Encryption
Standard (AES) protection The keys are automatically
generated at the beginning of
each video session, and according
to research, are so strong, it
would take a supercomputer one
“billion billion” years to breach a
128-bit AES key.
https://highfive.com/blog/5-steps-for-secure-video-conferencing
Logically unbreakable
Video Conferencing Security Best
Practices
• single sign-on (SSO) for user
authentication
SSO credentials are tied to a
user’s authorization and
entitlements profile, IT can
track where, when and how
credentials are used
https://highfive.com/blog/5-steps-for-secure-video-conferencing
it greatly reduces the risk of
user credentials being lost,
stolen or compromised
Video Conferencing Security Best
Practices
• Domain-based approach to
security The first mistake is connecting it
directly to the Internet without
using a firewall.
The second is setting it to
automatically answer incoming
video calls, which provides
remote intruders with easy
access.
https://highfive.com/blog/5-steps-for-secure-video-conferencing
enables the system
administrator to control
access to video conferences
by assigning various levels of
permission to users
Video Conferencing Security Best
Practices
• A video conferencing policy • Users must get permission to record a video
conference from everyone on the call.
• Personal mobile devices should not be used
to record video conferences.
• Sensitive information should be discussed in
designated video conference rooms and not
in public places or open office spaces.
• Video conferences conducted at a user’s desk
should train the camera to focus on the users
face, and any visible confidential data should
be removed from camera view.
• Cameras and microphones should be turned
off when not in use.
• Remote control of cameras is for
authenticated users only.
https://highfive.com/blog/5-steps-for-secure-video-conferencing
sensitive information, such as
hospitals and financial
institutions will want to be
specific about who users can
connect with via video
conference
Tips for protecting the video
conferencing environment
Always ensure that meetings are password-protected
Don’t share meeting information on public platforms.
Use host controls to your advantage.
Utilize waiting rooms or lobbies.
Notify users if the meeting is being recorded.
Disable file transfer features.
Always update to the latest version.
The host joins first.
Tips for protecting the video
conferencing environment
Lock calls after everyone joins
Make sure that every attendee speaks at the start of the
call, maybe even on video. It helps deal with isolation and
identifies unknown attendees.
Prevent the recording of meetings
Don’t allow participants to screen share by default.
Background Blur
https://www.businessinsider.in/slideshows/miscellaneous/here-are-the-best-funny-images-and-memes-
to-use-as-a-zoom-background/slidelist/74921244.cms#slideid=74921267
Question = How does Google Meet,
Microsoft Teams and Zoom differ in
their approach?
Microsoft Teams and Google Meet require users
to have accounts with them,
whereas Zoom allows users to participate using
their web browsers.
Google Meet (previously known as
Google Hangouts Meet )
• Google's Multi-layered security
• Meet has no need for frequent security patches, simply because the
application works fully in your browser.
• Google Meet supports the same robust privacy commitments and
data protections as the rest of Google Cloud’s enterprise services.
• In G Suite Enterprise and G Suite for Education, customers can use
additional advanced security functionalities like Access
Transparency.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Google Meet Features
• Meet doesn’t have user attention-tracking features or software.
• All data in Google Meet is encrypted in transit by default between
the client and Google for video meetings on a web browser, on the
Android and iOS apps, and in meeting rooms with Google meeting
room hardware.
• All Meet recorded meetings are stored in Google Drive and get
encrypted by default, like all data that you store in Drive.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Google Meet Features
• To secure your online meetings further, Google has taken several
anti-intruder measures to make sure your video meetings are safe
from unwanted guests. These include anti-hijacking measures for
both web video meetings and telephony dial-ins.
• The way Google Meet works, guests can enter video meetings via a
simple meeting link in the browser or Meet app. Very convenient,
but is this safe? Yes it is! Google makes it nearly impossible for
external people with bad intentions to crack your video meeting IDs
programmatically.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Avoiding unwanted guests with
secure meeting IDs
• Google Meet meeting codes are 10 characters long, with 25
characters in the set. This makes it impossible for outsiders to “guess”
meeting codes and join an internal video meeting that way.
• Pro tip: pay attention not to share your meeting links to externals
that don’t need to get access to your video meetings. This could for
example happen when you share a screenshot of your meeting room
where the meeting link is visible in the browser. These days a lot of
companies are sharing such screenshots on LinkedIn to show how
they stay in touch with their employees.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Mitigating External participants risk
through identified meeting links
• External participants from
outside the host’s domain can
join a video meeting directly
with the encrypted link. But
they can do this only if they
are on the Calendar invite for
this video meeting, or if they
have been invited by in-
domain participants from the
Google Meet session.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Mitigating External participants risk
through identified meeting links
• Any other external participants must request to join the meeting,
and this request must be accepted by a member of the host
organisation of the meeting before this person can actually enter the
meeting. Unexpected or unwanted meeting guests can simply be
refused to enter the meeting by one of the meeting hosts.
• In addition to that measure, Google also makes it impossible for
externals to join a scheduled video meeting in Google Meet more
than 15 minutes before the meeting actually starts. This is reducing
even more the opportunity window for malicious ‘meeting-bombers’
to attempt to break in your video meeting.
https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
Good practices for Google Meet
• Only meeting creators and calendar owners can mute or remove
other participants. This ensures that instructors can't be removed or
muted by student participants.
• Only meeting creators and calendar owners can approve requests to
join made by external participants. This means that students can’t
allow external participants to join via video, and that external
participants can’t join before the instructor.
• Meeting participants can’t rejoin nicknamed meetings once the final
participant has left. This means if the instructor is the last person to
leave a nicknamed meeting, students can’t join later without the
instructor present.
https://support.google.com/a/answer/7582940?hl=en

More Related Content

PPTX
A technical review of Google Meet
PDF
Installation of google meet in mobile, their buttons and functions
PDF
Zoom Tutorial
PPTX
Zoom security and meeting participant management
PDF
Zoom how to guides
PPTX
How to work zoom meeting apps | zoom cloud meetings
PPTX
how to schedule Google meet by using smart phone
PDF
How to Zoom
A technical review of Google Meet
Installation of google meet in mobile, their buttons and functions
Zoom Tutorial
Zoom security and meeting participant management
Zoom how to guides
How to work zoom meeting apps | zoom cloud meetings
how to schedule Google meet by using smart phone
How to Zoom

What's hot (19)

PPTX
Google+ Hangouts Tutorial
PDF
Video Conferencing Software Tools 2020
PPSX
How to use Zoom for conducting Meetings and Classes
PPTX
Google hangouts
PPTX
Google Meet Platform Tutorial
PPTX
Google Hangouts (for dummies)
PPTX
Selfhelp Online class Google Hangouts Capture App (blue camera)
DOCX
Talk outline
PPTX
Zoom Tutorial for joining a team on Mobile
PPTX
Google Hangouts User Guide
PPTX
Adsız sunu (2)
PDF
How to use google hangout
PDF
Google meet guide file
PPT
Embedding video in powerpoint
PPTX
Join.me basics
PPTX
Blogging presentation
PDF
Microsoft Teams Tutorial
DOCX
Google Hangouts On Air Procedure
PPT
How to take a webinar
Google+ Hangouts Tutorial
Video Conferencing Software Tools 2020
How to use Zoom for conducting Meetings and Classes
Google hangouts
Google Meet Platform Tutorial
Google Hangouts (for dummies)
Selfhelp Online class Google Hangouts Capture App (blue camera)
Talk outline
Zoom Tutorial for joining a team on Mobile
Google Hangouts User Guide
Adsız sunu (2)
How to use google hangout
Google meet guide file
Embedding video in powerpoint
Join.me basics
Blogging presentation
Microsoft Teams Tutorial
Google Hangouts On Air Procedure
How to take a webinar
Ad

Similar to 20210112 web conferencing tools (20)

PDF
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
PPTX
EasyWebMeeting Presentation
PPT
Video conferencing and its free tools/apps
PPTX
First Time Video Conferencing
PDF
Ntm 2.0 arvola presentation
PPTX
Creating engagement in online meetings using zoom
PDF
How secure are chat and webconf tools
DOCX
Video Conferencing from Home: 9 Mistakes to Avoid
PDF
Dreamtek guide to video webcasting
PPTX
Web conferencing.....
PDF
Technology Tools to increase efficiency in 2020
PDF
The ABC Of Video Marketing
PPTX
Getting the Most Out of Lifesize Cloud
PPTX
Virtual meeting
PDF
Network Planning Worksheets for Video Conferencing
PPTX
Hosting a virtual party with live trivia
PDF
Producing Live Events 
on Zoom
PPTX
Let's go Virtual- Guide to Using Zoom for Rotary Clubs
PPT
Webiner Presentation
PDF
Tiếng Anh công nghệ thông tin VHU Tuần 5
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
EasyWebMeeting Presentation
Video conferencing and its free tools/apps
First Time Video Conferencing
Ntm 2.0 arvola presentation
Creating engagement in online meetings using zoom
How secure are chat and webconf tools
Video Conferencing from Home: 9 Mistakes to Avoid
Dreamtek guide to video webcasting
Web conferencing.....
Technology Tools to increase efficiency in 2020
The ABC Of Video Marketing
Getting the Most Out of Lifesize Cloud
Virtual meeting
Network Planning Worksheets for Video Conferencing
Hosting a virtual party with live trivia
Producing Live Events 
on Zoom
Let's go Virtual- Guide to Using Zoom for Rotary Clubs
Webiner Presentation
Tiếng Anh công nghệ thông tin VHU Tuần 5
Ad

More from Ramesh C. Sharma (20)

PDF
Using FREECAM for creating video content, Screen recording and editing
PDF
20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp P...
PDF
A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...
PDF
Educación remota de emergencia durante la pandemia Covid-19
PDF
20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses
PDF
20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design
PDF
20210928 Global study on Open Education and Open Science: Practices, use case...
PDF
20210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.0
PDF
Learning Systems for Unlearn and Relearn
PDF
20210807 Pandemic Diaries: Ripples in Education
PDF
20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...
PDF
20210623 Digital Technologies and Innovations in Education
PPTX
Perspective of National Education Policy 2020: Self-Learning as the way Forward
PDF
How to use orcid to build your work and reseach profile
PDF
Creating mind map on Online Facilitation
PPTX
How to use padlet
PDF
How to use Mendeley for Citation and References Management in Research.
PDF
Cooperative Learning Pedagogy
PDF
Reference Management tools for Academic Writing
PDF
Using online graph paper with the help of Google Jamboard
Using FREECAM for creating video content, Screen recording and editing
20211210 PodMOOCs and the Expansion of New Age OER #oercampglobal #oercamp P...
A Global Study of Macro, Meso and Micro aspects of Open Education due to COVI...
Educación remota de emergencia durante la pandemia Covid-19
20210907-ISAGA-Gamified Framework for Educational Simulations in STEM Courses
20210922-ICETOL-Innovative Applications of Online Pedagogy and Course Design
20210928 Global study on Open Education and Open Science: Practices, use case...
20210807 Smart Open and Distance Learning (SDOL) from 6.0 to 7.0
Learning Systems for Unlearn and Relearn
20210807 Pandemic Diaries: Ripples in Education
20210623 Learning to Self Learn: Harnesing the Powers of Quantum Technologies...
20210623 Digital Technologies and Innovations in Education
Perspective of National Education Policy 2020: Self-Learning as the way Forward
How to use orcid to build your work and reseach profile
Creating mind map on Online Facilitation
How to use padlet
How to use Mendeley for Citation and References Management in Research.
Cooperative Learning Pedagogy
Reference Management tools for Academic Writing
Using online graph paper with the help of Google Jamboard

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

20210112 web conferencing tools

  • 2. Exercise Name some of the Video Conference Tools you have used or heard of.
  • 4. Exercise By what method you can guarantee 100% protection from threats while using web conference tools?
  • 6. work-from-home (WFH) Image by Lynette Coulston from Pixabay Vulnerabilities
  • 7. Zoom Bomb: CSUB ASI Board Meeting Breached by Trolls https://www.youtube.com/watch?v=OEs6mdMgAKU
  • 8. Zoom-bombing disrupted a House Oversight Committee meeting https://www.zdnet.com/article/zoom-bombing-disrupted-a-house-oversight-committee-meeting/
  • 10. Video Conferencing Security Best Practices • Is your current video solution is a legacy system, or is more than five years old? A few things that will help you decide if your current system is too big a risk are: • the type of data encryption the system uses; • how callers log in; • and how the system manages data. https://highfive.com/blog/5-steps-for-secure-video-conferencing Outdated System
  • 11. Video Conferencing Security Best Practices • 128-bit Advanced Encryption Standard (AES) protection The keys are automatically generated at the beginning of each video session, and according to research, are so strong, it would take a supercomputer one “billion billion” years to breach a 128-bit AES key. https://highfive.com/blog/5-steps-for-secure-video-conferencing Logically unbreakable
  • 12. Video Conferencing Security Best Practices • single sign-on (SSO) for user authentication SSO credentials are tied to a user’s authorization and entitlements profile, IT can track where, when and how credentials are used https://highfive.com/blog/5-steps-for-secure-video-conferencing it greatly reduces the risk of user credentials being lost, stolen or compromised
  • 13. Video Conferencing Security Best Practices • Domain-based approach to security The first mistake is connecting it directly to the Internet without using a firewall. The second is setting it to automatically answer incoming video calls, which provides remote intruders with easy access. https://highfive.com/blog/5-steps-for-secure-video-conferencing enables the system administrator to control access to video conferences by assigning various levels of permission to users
  • 14. Video Conferencing Security Best Practices • A video conferencing policy • Users must get permission to record a video conference from everyone on the call. • Personal mobile devices should not be used to record video conferences. • Sensitive information should be discussed in designated video conference rooms and not in public places or open office spaces. • Video conferences conducted at a user’s desk should train the camera to focus on the users face, and any visible confidential data should be removed from camera view. • Cameras and microphones should be turned off when not in use. • Remote control of cameras is for authenticated users only. https://highfive.com/blog/5-steps-for-secure-video-conferencing sensitive information, such as hospitals and financial institutions will want to be specific about who users can connect with via video conference
  • 15. Tips for protecting the video conferencing environment Always ensure that meetings are password-protected Don’t share meeting information on public platforms. Use host controls to your advantage. Utilize waiting rooms or lobbies. Notify users if the meeting is being recorded. Disable file transfer features. Always update to the latest version.
  • 16. The host joins first. Tips for protecting the video conferencing environment Lock calls after everyone joins Make sure that every attendee speaks at the start of the call, maybe even on video. It helps deal with isolation and identifies unknown attendees. Prevent the recording of meetings Don’t allow participants to screen share by default.
  • 18. Question = How does Google Meet, Microsoft Teams and Zoom differ in their approach? Microsoft Teams and Google Meet require users to have accounts with them, whereas Zoom allows users to participate using their web browsers.
  • 19. Google Meet (previously known as Google Hangouts Meet ) • Google's Multi-layered security • Meet has no need for frequent security patches, simply because the application works fully in your browser. • Google Meet supports the same robust privacy commitments and data protections as the rest of Google Cloud’s enterprise services. • In G Suite Enterprise and G Suite for Education, customers can use additional advanced security functionalities like Access Transparency. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 20. Google Meet Features • Meet doesn’t have user attention-tracking features or software. • All data in Google Meet is encrypted in transit by default between the client and Google for video meetings on a web browser, on the Android and iOS apps, and in meeting rooms with Google meeting room hardware. • All Meet recorded meetings are stored in Google Drive and get encrypted by default, like all data that you store in Drive. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 21. Google Meet Features • To secure your online meetings further, Google has taken several anti-intruder measures to make sure your video meetings are safe from unwanted guests. These include anti-hijacking measures for both web video meetings and telephony dial-ins. • The way Google Meet works, guests can enter video meetings via a simple meeting link in the browser or Meet app. Very convenient, but is this safe? Yes it is! Google makes it nearly impossible for external people with bad intentions to crack your video meeting IDs programmatically. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 22. Avoiding unwanted guests with secure meeting IDs • Google Meet meeting codes are 10 characters long, with 25 characters in the set. This makes it impossible for outsiders to “guess” meeting codes and join an internal video meeting that way. • Pro tip: pay attention not to share your meeting links to externals that don’t need to get access to your video meetings. This could for example happen when you share a screenshot of your meeting room where the meeting link is visible in the browser. These days a lot of companies are sharing such screenshots on LinkedIn to show how they stay in touch with their employees. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 23. Mitigating External participants risk through identified meeting links • External participants from outside the host’s domain can join a video meeting directly with the encrypted link. But they can do this only if they are on the Calendar invite for this video meeting, or if they have been invited by in- domain participants from the Google Meet session. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 24. Mitigating External participants risk through identified meeting links • Any other external participants must request to join the meeting, and this request must be accepted by a member of the host organisation of the meeting before this person can actually enter the meeting. Unexpected or unwanted meeting guests can simply be refused to enter the meeting by one of the meeting hosts. • In addition to that measure, Google also makes it impossible for externals to join a scheduled video meeting in Google Meet more than 15 minutes before the meeting actually starts. This is reducing even more the opportunity window for malicious ‘meeting-bombers’ to attempt to break in your video meeting. https://www.fourcast.io/blog/security-privacy-in-google-meet-video-conferencing
  • 25. Good practices for Google Meet • Only meeting creators and calendar owners can mute or remove other participants. This ensures that instructors can't be removed or muted by student participants. • Only meeting creators and calendar owners can approve requests to join made by external participants. This means that students can’t allow external participants to join via video, and that external participants can’t join before the instructor. • Meeting participants can’t rejoin nicknamed meetings once the final participant has left. This means if the instructor is the last person to leave a nicknamed meeting, students can’t join later without the instructor present.