In: Computer Science
How was "Zoom Bombing" able to occur? Did the application "Zoom" not have enough security measures in place?
ZOOM BOMBING
Zoom Bombing is a disruptive intrusion or an unwanted intrusion occurs by internet trolls into a video conference call.
It is a cyber attack in which a stranger, a individual or a group of people can enter the meeting without the permission of the host.
It is also known as 'zoom raiding'.
Through zoom bombing a complete stranger can enter into the meeting and he/she can wreck havoc.
Offensive images or explicit images,hate language,and hate speech are shared through zoom bombing.
How Zoom Bombing occur:
Zoom Bombing mainly occurs through video hijacking.
This video hijacking attempt occurs when meetings and conferences are hosted on public channels and which is been shared on internet and all sites via URLs in such a manner that every individual can access it.
The video hijackers can sometimes guess the correct meeting ID or meeting URL to join for the session,which give them complete access to the feed.
The Application Zoom has enough security measures in place.some of the security measures include:
Public zoom calls and large zoom calls must be accessed by using a unique ID.
A meeting password is required.
Unique ID should not be shared publicly.
Waiting room must be created.
Sharing of screen must be allowed to access only by the host.
File transfer settings active must be kept disabled.
The participant's camera must be disabled.
Invite-only meeting must be created.
Once the meeting gets started,it must be locked.
Attendees must be removed or put them on hold.
The meeting must be secured with encryption.
Audio signatures.
Expelling of a participant or all participants.
Screen sharing of watermarks.