DELIVERABLE 1 (GROUP O)

.pptx

School

Seneca College *

*We aren’t endorsed by this school

Course

ADMN4896

Subject

Information Systems

Date

Jun 21, 2024

Type

pptx

Pages

21

Uploaded by CountTurkey2826

ADMN 4896A Cu ren t Top ic s in Adm in is t ra t ion 1 De l ive rab le 1 PROFESSOR V inay Y a r lagadda . Due da te : 15 /05 /2024 G roup O Jaykuma r pa te l (239587920 ) Ha rp re t S ingh S idhu (239577030 ) Ha rp re t Kau r (239612870 ) Gagandep Kau r (239536470 ) Jyo t i Ran i (239698540 ) Uzma Fa t ima (229556150 ) Ha rs im ran S ingh (239615480 )
Problem statement Resolving privacy and security weaknesses, especially in data protection, authentication, and cryptography, is crucial for Zoom Video. In the next six months, prompt actions must be taken to advance protections, rebuild trust, and comply with regulations. Zoom may face a serious threat in the market position as well as future growth if the problems are not fully resolved as they can result in a damage to the brand, lack of users’ trust, and imposition of penalties by the authorities.
Strengths Already having established brand recognition and wide adoption. Agile development for fast bug fixes and updates. The dedicated security team which deals with the weaknesses. Establishing solid revenue grounds to invest in security improvements.
Weakness Previous incidents of security breaches becoming a step behind user trust Vulnerability to exploitation of the third-party components some of them are not under your control. The target audience may feel confused about the privacy and security issues that may occur due to lack of clear instructions. There is no full control over users’ behaviors and security of the devices.
Opportunities Partner up with cybersecurity professionals to carry out a valid plan of actions. Have advanced encryption and authentication methods being in place. Use users feedback for experiencing to define the line of development of security features. The need for expanded partnerships with regulatory authorities to keep compliance should be considered as well.
Threats CONSIDERING THAT CYBERSECURITY THREATS ARE CONTINUALLY EMERGING AND BECOMING MORE COMPLEX. TIGHT REGULATORY CONTROLS AND POSSIBILITY OF FINES FOR NON- COMPLIANCE COMPETITIVE PRESSURE FROM THE RIVAL VIDEO CONFERENCING APPS ON THE MARKET AS WELL. AN UNHELPFUL MEDIA WHICH SENSATIONALIZES WORRIES ABOUT PRIVACY AND TRUST .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help