In: Computer Science
How was "Zoom Bombing" able to occur? Did the application "Zoom" not have enough security measures in place?
ZOOM BOMBING
Zoom
Bombing is a disruptive intrusion or an unwanted intrusion occurs
by internet trolls into a video conference call.
It
is a cyber attack in which a stranger, a individual or a group of
people can enter the meeting without the permission of the
host.
It
is also known as 'zoom raiding'.
Through
zoom bombing a complete stranger can enter into the meeting and
he/she can wreck havoc.
Offensive
images or explicit images,hate language,and hate speech are shared
through zoom bombing.
How Zoom Bombing occur:
Zoom
Bombing mainly occurs through video hijacking.
This
video hijacking attempt occurs when meetings and conferences are
hosted on public channels and which is been shared on internet and
all sites via URLs in such a manner that every individual can
access it.
The
video hijackers can sometimes guess the correct meeting ID or
meeting URL to join for the session,which give them complete access
to the feed.
The Application Zoom has enough security measures in place.some of the security measures include:
Public
zoom calls and large zoom calls must be accessed by using a unique
ID.
A
meeting password is required.
Unique
ID should not be shared publicly.
Waiting
room must be created.
Sharing
of screen must be allowed to access only by the host.
File
transfer settings active must be kept disabled.
The
participant's camera must be disabled.
Invite-only
meeting must be created.
Once
the meeting gets started,it must be locked.
Attendees
must be removed or put them on hold.
The
meeting must be secured with encryption.
Audio
signatures.
Expelling
of a participant or all participants.
Screen
sharing of watermarks.