Changes

Jump to navigation Jump to search
Line 64: Line 64:     
When a meeting is created, Zoom generates a seemingly random ID that is 9 to 11 digits long. For someone with computing resources, this can easily be cracked allowing malicious actors to join the call.  
 
When a meeting is created, Zoom generates a seemingly random ID that is 9 to 11 digits long. For someone with computing resources, this can easily be cracked allowing malicious actors to join the call.  
 +
 +
Zoom has two applicable use cases in an enterprise government sense:
 +
 +
*Installation of Zoom on government-furnished devices:  No software (free or otherwise) should be installed on a government-furnished device (i.e. laptop, tablet or corporate “side” of government-issued smartphone) unless it goes through a security assessment, and all software needs to have a patch management strategy in place to ensure updates can be applied promptly.  This applies to Zoom as well.
 +
 +
*Installation of Zoom on personal devices (or the personal “side” of government-issued smartphones):  This is impossible to manage because we have no control over what users can do in this scenario.  This is where education about when and how to use  comes into a play.
 +
    
For more information on using Zoom, please see the guide in the references section or [[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|click here]].
 
For more information on using Zoom, please see the guide in the references section or [[:en:images/9/90/EN_-_Starter_guide_for_taking_part_in_a_Zoom_call.pdf|click here]].

Navigation menu

GCwiki