Describe what the methods are all about and how you have executed the methodology.

Learning Goal: I’m working on a cyber security exercise and need support to help me learn.I need a document with the below details: Title : Zoom/Teams and Conference SW Security and Open Source Conference Systems Problem need to be discussed: Privacy issues in Zoom/Teams and Open Source Conference Systems Abstract An abstract is a short informative summary that briefly describes the problem, summarizes the main argument, the research methods and procedures and lists the main findings and conclusions. Remember to keep it brief, normally an abstract must not exceed 500 words in the case of a thesis and 300 words in the case of a dissertation. This summary must appear in the front of the dissertation or thesis following the table of content and must end with a list of not more than ten key words. Methods and the materials The research methodology will explain to your reader the methods you used to gather the information and data for your paper to answer your research question, almost like a recipe. This chapter is regarded as the core of the dissertation or thesis as an error or weakness in this explanation can invalidate the findings, dooming the study as a whole. This chapter is often scrutinized very critically by other scientists, and weigh heavily in examining. Start the chapter with a clear explanation of the methodology that will be used to solve the problem (a framework diagram is a must here to support your methodology).
Provide a detailed description of the components of the methodology.
Describe what the methods are all about and how you have executed the methodology. It should be clear why you choose to use this specific methodology for answering your research question
Use at least 4 tables & 4 figures.
The responses should be 14 pages in length, not including the title or reference pages and using APA style guidelines,
-References: The references should not before 2019 and not in the list below please :
Aiken, A. (2020). Zooming in on privacy concerns: Video app Zoom is surging in popularity. In our rush to stay connected, we need to make security checks and not reveal more than we think. Index on Censorship, 49(2), 24-27. Botha, R., & Furnell, S. (2021). Facing up to security and privacy in online meetings. Network Security, 2021(5), 7-13. Botacin, M., Judd, M., Lange, A., Li, T. C., & Salathé, M. (2021). Does Your Threat Model Consider Country and Culture? A Case Study of Brazilian Internet Banking Security to Show That It Should!. Čižmešija, A., & Bubaš, G. (2020). An instrument for evaluating the use of the web conferencing system BigBlueButton in e-learning. In Central European Conference on Information and Intelligent Systems (pp. 63-71). Faculty of Organization and Informatics Varazdin. DJEKI, E., DEGILA, J., BONDIOMBOUY, C., & ALHASSAN, M. H. (2021, November). Security Issues in Digital Learning Spaces. In 2021 IEEE International Conference on Computing (ICOCO) (pp. 71-77). IEEE. Retrieved from; https://ieeexplore.ieee.org/abstract/document/9673575 Hakak, S., Khan, W. Z., Imran, M., Choo, K. K. R., & Shoaib, M. (2020). Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies. Ieee Access, 8, 124134-124144. Isobe, T., & Ito, R. (2021). Security Analysis of End-to-End Encryption for Zoom Meetings. IACR Cryptol. ePrint Arch., 2021, 486. Retrieved from; https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9462825 Kagan, D., Alpert, G. F., & Fire, M. (2020). Zooming into video conferencing privacy and security threats. arXiv preprint arXiv:2007.01059.‏ Mahr, A., Cichon, M., Mateo, S., Grajeda, C., & Baggili, I. (2021). Zooming into the pandemic! A forensic analysis of the Zoom Application. Forensic Science International: Digital Investigation, 36, 301107. Mohanty, M., & Yaqub, W. (2020, September). Seamless authentication for online teaching and meeting. In 2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM) (pp. 120-124). IEEE. Singh, J., & Chaudhary, N. K. (2022). OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities. Journal of Information Security and Applications, 65, 103091. Singh, R., & Awasthi, S. (2020). Updated comparative analysis on video conferencing platforms-zoom, Google meet, Microsoft Teams, WebEx Teams, and GoToMeeting. EasyChair Preprint, 4026, 1-9.
Requirements: 14 pages   |   .doc file

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more