In
the army, Video Conferencing Meetings is now commonly used to
accomplish real-time and faster decisions making for control programs
and to enhance fight efficiency for war time competitors.
As Video
Conference meetings has gone popular, the issues of conferencing and
interaction support groups have moved. In the past, interaction
supervisors targeted on basic performance, stability, and offering
the best possible consumer experience (as calculated in improvements
in components, software and social media technology. Today, the
lion's share of the attention is on the visibility of cooperation
tools to IP system protection risks. Whether the systems or
interaction classes are organized on protected or non-secure systems,
the protection risks and issues are essentially same.
Army
companies and its organizations view protection as a natural wrapper
that includes all forms of information transfer and the various
programs that run on those transportation channels. As the
transactions that are held among the army verticals are high
confidential and are regarding the country's security, the
significance of the secure video conference is growing high and is
mandatory.
In
concern with the security specifications of the armed forces, the
Video Conferencing technology
vendors are implementing penetration testing mechanisms in the Video
Conferencing software. This testing covers a wide range of testing
vulnerabilities such as buffer overflows, integer overflow, format
string issues, SQL injections, command injection and cross-site
scripting.
As
the military and defence are the most significant operational
departments where nations pride and security are dependent. The
following are the security capabilities which must be embedded in a
Video
Conferencing Solution that is intended for the military and
defence purpose.
Account
Management:
The
virtual conference solution for military purpose must have proper
account management, must restrict intruders to login, default
lock-out must be enabled in case of failed login attempts.
Password
Management:
Password
management is a significant functionality that enables the military
officials to restrict the intrudes to enter the conference. Under the
password management functionality, the web conferencing solution must
have the ability to refine all the default password, must force the
user to change the password at frequent intervals of time, must
define complex password rules. The solution must be embedded with
SHA-1 hash algorithm for password protection.
Session
Management:
Automated
period timeout Full monitoring of sign in history (last successful
sign in, up to 10 unsuccessful sign in attempts) Full monitoring of
administrative and owner actions via auditor performance.
Encryption:
Encryption
techniques must be integrated with the solution, through this
technique the moderator can restrict the, intruders to find the login
details of the conference. FIPS-140, 128 bit AES and SHA-1 hash (one
way encryption) techniques must be integrated in a video conferencing
solution.
Attack
Surface Reduction:
- Utilizationof hardened as well as lowered set operating system. Programmed utilization of Gold Hard drive in order to authenticate safety regarding consumer Computers.
- Utilizationof reasonably couple of supervision as well as advertising places intended for regular employ.
- Business presentation regarding supervision interfaces with a distinct, administration only network.
Auditing:
- Entire auditing regarding safety similar situations, sign in tries, as well as crucial program changes
- Each and every information regarding the IP address of the user, user name and date and time, must be maintained as of the audit record.
- Must save all the transactions of the users and must allow access for read-only operations Recording coming from all phone exercise (via phone detail record/CDR's).
Backup
and Recovery:
- Support pertaining to offloading regarding audit firewood
- Chance to back up as well as reestablish system configurations (for fast recovery via outages)
- Chance to return in order to hardware-level manufacturing plant options.
