DELIVERABLE 1 (GROUP O)
.pptx
keyboard_arrow_up
School
Seneca College *
*We aren’t endorsed by this school
Course
ADMN4896
Subject
Information Systems
Date
Jun 21, 2024
Type
pptx
Pages
21
Uploaded by CountTurkey2826
ADMN
4896A
Cu
ren
t
Top
ic
s
in
Adm
in
is
t
ra
t
ion
1
De
l
ive
rab
le
1
PROFESSOR
V
inay
Y
a
r
lagadda
.
Due
da
te
:
15
/05
/2024
G
roup
O
Jaykuma
r
pa
te
l
(239587920
)
Ha
rp
re
t
S
ingh
S
idhu
(239577030
)
Ha
rp
re
t
Kau
r
(239612870
)
Gagandep
Kau
r
(239536470
)
Jyo
t
i
Ran
i
(239698540
)
Uzma
Fa
t
ima
(229556150
)
Ha
rs
im
ran
S
ingh
(239615480
)
Problem statement Resolving privacy and security weaknesses, especially in data protection, authentication, and cryptography, is crucial for Zoom Video. In the next six months, prompt actions must be taken to advance protections, rebuild trust, and comply with regulations. Zoom may face a serious threat in the market position as well as future growth if the problems are not fully resolved as they can result in a damage to the brand, lack of users’ trust, and imposition of penalties by the authorities.
Strengths
Already having established brand recognition and wide adoption.
Agile development for fast bug fixes and updates.
The dedicated security team which deals with the weaknesses.
Establishing solid revenue grounds to invest in security improvements.
Weakness
Previous incidents of security breaches becoming a step behind user trust
Vulnerability to exploitation of the third-party components some of them are not under your control.
The target audience may feel confused about the privacy and security issues that may occur due to lack of clear instructions.
There is no full control over users’ behaviors and security of the devices.
Opportunities
–
Partner up with cybersecurity professionals to carry out a valid plan of actions.
–
Have advanced encryption and authentication methods being in place.
–
Use users feedback for experiencing to define the line of development of security features.
–
The need for expanded partnerships with regulatory authorities to keep compliance should be considered as well.
Threats
CONSIDERING THAT CYBERSECURITY THREATS ARE CONTINUALLY EMERGING AND BECOMING MORE COMPLEX.
TIGHT REGULATORY CONTROLS AND POSSIBILITY OF FINES FOR NON-
COMPLIANCE
COMPETITIVE PRESSURE FROM THE RIVAL VIDEO CONFERENCING APPS ON THE MARKET AS WELL.
AN UNHELPFUL MEDIA WHICH SENSATIONALIZES WORRIES ABOUT PRIVACY AND TRUST
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help