Changes

Jump to navigation Jump to search
Line 65: Line 65:  
When a meeting is created, Zoom generates a seemingly random ID that is 9 to 11 digits long. For someone with computing resources, this can easily be cracked allowing malicious actors to join the call.  
 
When a meeting is created, Zoom generates a seemingly random ID that is 9 to 11 digits long. For someone with computing resources, this can easily be cracked allowing malicious actors to join the call.  
   −
Zoom has two applicable use cases in an enterprise government sense:
  −
  −
*Installation of Zoom on government-furnished devices:  No software (free or otherwise) should be installed on a government-furnished device (i.e. laptop, tablet or corporate “side” of government-issued smartphone) unless it goes through a security assessment, and all software needs to have a patch management strategy in place to ensure updates can be applied promptly.  This applies to Zoom as well.
  −
  −
*Installation of Zoom on personal devices (or the personal “side” of government-issued smartphones):  This is impossible to manage because we have no control over what users can do in this scenario.  This is where education about when and how to use  comes into a play.
  −
  −
In either case, the product itself is only approved for unclassified (i.e. open discussions only) and we strongly recommend following best practices that are listed on the [https://blog.zoom.us/wordpress/2020/03/20/keep-uninvited-guests-out-of-your-zoom-event/. Zoom blog].
      
For more information on how to create a Zoom conference, please see the guide in the references section or [[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|click here]].
 
For more information on how to create a Zoom conference, please see the guide in the references section or [[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|click here]].

Navigation menu

GCwiki