You are on page 1of 7

COLLEGE OF ADMINISTRATIVE AND FINANCIAL SCIENCES

Week No: 6
Trimester: 3rd , AY 2020-2021
25
ASSIGNMENT-2
MARKS

COURSE CODE COMP624 COURSE TITLE Information Resource Management


SECTION TIME DAYS ROOM
STUDENT NAME ID NO. DATE

Computer Crime, Privacy issues


TOPIC

ASSIGNEMENT
OBJECTIVE C3.Apply standard research or investigative methods of information systems
management in business.

C4.Utilize the specialist level security management strategies to ensure


security of business applications.
ASSIGNMENT
DIRECTION & This is an individual activity. Give your analysis and discussion to the given topic
REQUIREMENT/
S with suitable contents related with the Managing Information Technology
(Identify the ILOs to Guidelines:
be assessed at the
end of each 1. Write a cover page in our university format including name of the student
requirement.
Include the rubric or with ID, course code, section and course name.
marking scheme for
each 2. Answer in A4 MS word format
item/requirement.)
3. Try to answer the question based on critical thinking given from the case
study in the class.
4. Submission deadline – on the same day of the assignment.
Zoom faces a privacy and security backlash as it surges in
popularity
Zoom has exploded in popularity as people turn to video calling
software amid the ongoing coronavirus pandemic. The moment of huge
growth has seen Zoom rocket to the top of iOS and Android app stores
as people gather around it for yoga classes, school lessons, and virtual
nights out. Even the UK government has been holding daily cabinet
meetings over Zoom. With all this extra attention, Zoom is now facing a
huge privacy and security backlash as security experts, privacy
advocates, lawmakers, and even the FBI warn that Zoom’s default
settings aren’t secure enough. Zoom now risks becoming a victim of its
own success. Zoom has battled security and privacy concerns before.
Prepared by: Reviewed and Verified by: Recommending Approval: Approved by:

Saeeda Younus Dr. Vishwas Chakranarayan Dr. Vinodh K.Natarajan Dr. Marluna Lim Urubio
Course Coordinator Programme Head Associate Dean College Dean
Date: Date: Date: Date:
COLLEGE OF ADMINISTRATIVE AND FINANCIAL SCIENCES
Week No: 6
Trimester: 3rd , AY 2020-2021
25
ASSIGNMENT-2
MARKS

COURSE CODE COMP624 COURSE TITLE Information Resource Management


SECTION TIME DAYS ROOM
STUDENT NAME ID NO. DATE

Apple was forced to step in and silently remove Zoom software from


Macs last year after a serious security vulnerability let websites hijack
Mac cameras. In recent weeks, scrutiny over Zoom’s security practices
has intensified, with a lot of the concern focused on its default settings
and the mechanisms that make the app so easy to use. Each Zoom call
has a randomly generated ID number between 9 and 11 digits long that’s
used by participants to gain access to a meeting. Researchers have found
that these meeting IDs are easy to guess and even brute forceable,
allowing anyone to get into meetings. Part of this ease of use has led to
the “Zoombombing” phenomenon, where pranksters join Zoom calls
and broadcast porn or shock videos. At fault here are Zoom’s default
settings which don’t encourage a password to be set for meetings, and
allow any participants to share their screen. 
Zoom adjusted these default settings for education accounts last week,
“in an effort to increase security and privacy for meetings.” For
everyone else, you’ll need to tweak your Zoom settings to ensure this
never happens. Zoombombing was the first of many recent Zoom
security and privacy concerns, though. Zoom was forced to update its
iOS app last week to remove code that sent device data to Facebook.
Zoom then had to rewrite parts of its privacy policy after it was
discovered that users were susceptible to their personal information
being used to target ads. User information is also reportedly being
leaked because of an issue with how Zoom groups contacts. Perhaps the
most damning issue came to light yesterday. While Zoom still states on
its website that you can “secure a meeting with end-to-end encryption,”
the company was forced to admit it’s actually misleading people.

Privacy advocates have also raised issues over an attendee tracking


feature that lets meeting hosts track whether participants have their
Zoom app in view on a PC or whether it’s simply in the background. A
digital rights advocacy group also called on Zoom to release a
Prepared by: Reviewed and Verified by: Recommending Approval: Approved by:

Saeeda Younus Dr. Vishwas Chakranarayan Dr. Vinodh K.Natarajan Dr. Marluna Lim Urubio
Course Coordinator Programme Head Associate Dean College Dean
Date: Date: Date: Date:
COLLEGE OF ADMINISTRATIVE AND FINANCIAL SCIENCES
Week No: 6
Trimester: 3rd , AY 2020-2021
25
ASSIGNMENT-2
MARKS

COURSE CODE COMP624 COURSE TITLE Information Resource Management


SECTION TIME DAYS ROOM
STUDENT NAME ID NO. DATE

transparency report last month, to share the number of requests from law


enforcement and governments for user data. Zoom has only said the
company is considering the request, and has not yet published a
transparency report. Security researchers and privacy advocates aren’t
the only groups raising concerns over Zoom.
The FBI is warning schools about the dangers of Zoom’s default settings
for Zoombombings, and reports suggest the UK’s Ministry of Defence
has banned Zoom while it investigates “security implications.” The
office of New York’s attorney general also sent a letter to Zoom this
week requesting to hear “whether Zoom has undertaken a broader
review of its security practices” in light of recent concerns.
CEO of Zoom, Eric S. Yuan said the company was reviewing its
practices in relation to the Facebook privacy issues. “We sincerely
apologize for the concern this has caused, and remain firmly committed
to the protection of our users’ privacy,” said Yuan. .
Zoom is now facing lawsuits that allege the company is illegally
disclosing personal information to third parties. Two lawsuits were filed
earlier this week in California, and one is seeking damages on behalf of
Zoom users for alleged violations of California’s Consumer Privacy
Act. As security researchers and privacy advocates continue to dig into
Zoom’s software and practices, there are signs more issues will need to
be addressed. Some are now discovering just how Zoom works around
OS restrictions by using “the same tricks that are being used by macOS
malware” to get its software on Macs.
“To join a meeting from a Mac is not easy, that is why this method is
used by Zoom and others,” says Zoom CEO Eric S. Yuan in a Twitter
response to the concerns.
Ultimately, Zoom is feeling the effects of a rare moment for the app.
The video conferencing app was never designed for the myriad of ways
consumers are now using it. Zoom doesn’t require an account, it’s free
for 40-minute meetings, and it’s reliable. The barriers to entry are so
low, and the coronavirus pandemic so unusual, that Zoom is suddenly in
the spotlight as a crucial tool for many. Zoom may well be forced to
Prepared by: Reviewed and Verified by: Recommending Approval: Approved by:

Saeeda Younus Dr. Vishwas Chakranarayan Dr. Vinodh K.Natarajan Dr. Marluna Lim Urubio
Course Coordinator Programme Head Associate Dean College Dean
Date: Date: Date: Date:
COLLEGE OF ADMINISTRATIVE AND FINANCIAL SCIENCES
Week No: 6
Trimester: 3rd , AY 2020-2021
25
ASSIGNMENT-2
MARKS

COURSE CODE COMP624 COURSE TITLE Information Resource Management


SECTION TIME DAYS ROOM
STUDENT NAME ID NO. DATE

tighten up the very parts of its app that make it so appealing for
consumers and businesses alike in the coming months. The company
now faces some tough decisions on how to better balance its default
settings, user privacy, and ultimately its ease of use. Zoom’s appeal has
been its simple approach to video conferencing, but that crucial
ingredient now threatens to be its downfall unless it gets a firm grip on
the growing concerns.
https://www.theverge.com/2020/4/1/21202584/zoom-security-privacy-
issues-video-conferencing-software-coronavirus-demand-response
1. Zoom is our biggest concerns for the users focuses on remote
working .
a. Interpret from the case the ethical issues faced by zoom. ( 5
Marks )
( the issues of the zoom should be clearly mentioned and
relate or compare with other applications such as google meet
or teams. References from the internet should be also give for
each of the issues )
b. Interpret on the privacy measures taken by zoom to protect
the zoom users from the pranksters ( 5 Marks )

2. According to New Delhi report April 17, 2020 : Govt says Zoom
video app unsafe, must not be used for its meetings. Compare all
your finding to the statements by using a standard online
investigation ( 10 Marks )
- There should be references
- Comparison between countries should be mentioned
- Examples should be provided
- Remedial measures from you opinion should be highlighted
The cyber coordination center of ministry stated that zoom video calling is not
safe. All government organizations should not use it for their personal meetings.
The report says many times vulgur video links and Images pop up during the
zoom video conference calls. The ministry says that zoom can be used for a
personal Individuals but not for government meetings.

Prepared by: Reviewed and Verified by: Recommending Approval: Approved by:

Saeeda Younus Dr. Vishwas Chakranarayan Dr. Vinodh K.Natarajan Dr. Marluna Lim Urubio
Course Coordinator Programme Head Associate Dean College Dean
Date: Date: Date: Date:
COLLEGE OF ADMINISTRATIVE AND FINANCIAL SCIENCES
Week No: 6
Trimester: 3rd , AY 2020-2021
25
ASSIGNMENT-2
MARKS

COURSE CODE COMP624 COURSE TITLE Information Resource Management


SECTION TIME DAYS ROOM
STUDENT NAME ID NO. DATE

Ministry said that zoom has some security concerns so it s better to avoid using
zoom for official meetings. US FBI also stated about the security-related issue of
zoom and warned people about chat leaks for the third- grade material.
References are newspaper articles on hindu.com. Examples - Port material Pop-
ups during the meetings Remedial measures: Government meetings should be
arranged in specific offices by maintaining social distance and with masks and
hand gloves to be safe from coronavirus.

3. Zoom users for alleged violations of Consumer Privacy Act.


Summarize on Consumer Privacy Act (CCPA) ( 5 Marks )

ASSIGNMENT Quastion1
OUTPUT
(A) Zoom bombing: This was the most concerned issue in using the zoom
app.When we get zoom bombed by somebody or any other organisation
during an important meetings.when thrid party joins your meeting
without permission and get involved and it could be embarrassing if you
are doing an important work and suddenly start sharing some
inappropriate images and videos.People started this kind of activity as a
prank but sometimes it may lead to a severe demage to country or even
somebody's personal life.

(B) End to End Encryption: Actually it was said to users that this app is
totally end to end encrypted but it actually was not.and for this activity
zoom was slapped by the FTC. Mac spying:Mac users complain about
this issues that when they uninstall the app even itheir webcam spied
on.This was the serious problem for mac users. Windows remote code
execution:This was the problem only with windows 7 users that flaw in
the zoom app can even allow attackers to take over your system.

Prepared by: Reviewed and Verified by: Recommending Approval: Approved by:

Saeeda Younus Dr. Vishwas Chakranarayan Dr. Vinodh K.Natarajan Dr. Marluna Lim Urubio
Course Coordinator Programme Head Associate Dean College Dean
Date: Date: Date: Date:
COLLEGE OF ADMINISTRATIVE AND FINANCIAL SCIENCES
Week No: 6
Trimester: 3rd , AY 2020-2021
25
ASSIGNMENT-2
MARKS

COURSE CODE COMP624 COURSE TITLE Information Resource Management


SECTION TIME DAYS ROOM
STUDENT NAME ID NO. DATE

(C) if we compare security issues of zoom with google meet then Google
Meet has numbers of security features that counteract interruptions and
concerns that are frequently addressed with Zoom meetings. For example,
it supports multiple 2-step verification options for user accounts and
adheres to IETF security standards for Datagram Transport Layer
Security and Secure Real-time Transport Protocol . this generates a
unique encryption key that only exists at the end of meeting and is
transmitted in an encrypted and secured remote procedure call when the
meeting is set up.

Quastion 2 :

The cyber coordination center of ministry stated that zoom video calling is not
safe. All government organizations should not use it for their personal meetings.
The report says many times vulgur video links and Images pop up during the
zoom video conference calls. The ministry says that zoom can be used for a
personal Individuals but not for government meetings.
Ministry said that zoom has some security concerns so it s better to avoid using
zoom for official meetings. US FBI also stated about the security-related issue of
zoom and warned people about chat leaks for the third- grade material.
References are newspaper articles on hindu.com. Examples - Port material Pop-
ups during the meetings Remedial measures: Government meetings should be
arranged in specific offices by maintaining social distance and with masks and
hand gloves to be safe from coronavirus.

Quastion 3 :

Consumer Privacy Act stated that a person's individual privacy should not be
violated until he himself is not sharing that information on any public platform.
This bill was passed by the government of California. Consumer privacy Act
defines the person's personal nformation such as his name, contact number, house
address, unique identification number.

Any app does not have the right to share such Information with third parties.
Prepared by: Reviewed and Verified by: Recommending Approval: Approved by:

Saeeda Younus Dr. Vishwas Chakranarayan Dr. Vinodh K.Natarajan Dr. Marluna Lim Urubio
Course Coordinator Programme Head Associate Dean College Dean
Date: Date: Date: Date:
COLLEGE OF ADMINISTRATIVE AND FINANCIAL SCIENCES
Week No: 6
Trimester: 3rd , AY 2020-2021
25
ASSIGNMENT-2
MARKS

COURSE CODE COMP624 COURSE TITLE Information Resource Management


SECTION TIME DAYS ROOM
STUDENT NAME ID NO. DATE

Zoom shares the data with Facebook which is illegal under this act. Under this
act, citizens have certain benefits such as say no to businesses to share their data,
say no to sell your data, ask to delete your personal data, etc.

5 - Details are fully complete and demonstrate deep understating of concept.


RUBRIC / 4 - Answer is acceptable but lacks minor details.
MARKING 3 - Answer is responsive but not fully complete
2 - Major details are missing and shows low level of understanding the content
SCHEME
1 - Answer is lacking multiple major details
0 - Non Submission
LEARNING ASSESSMENT/MARKING FACULTY/MARKER’S FEEDBACK
ITEM CILOs MARKS MARKS AWARDED
1 C3 10
2 C3 10
3 C4 5
TOTAL 25

Prepared by: Reviewed and Verified by: Recommending Approval: Approved by:

Saeeda Younus Dr. Vishwas Chakranarayan Dr. Vinodh K.Natarajan Dr. Marluna Lim Urubio
Course Coordinator Programme Head Associate Dean College Dean
Date: Date: Date: Date:

You might also like