Web conferencing is an Internet based application. For any Internet
application, there must be two types of security measures that
work together to ensure the adequate security:
- Transmission security - protecting data from wire-tapping
during the data transmission
- Access security - protecting applications from
unauthorized access.
For web conferencing applications, transmission security can be
easily met since every system has its own proprietary data format
and protocol,
which are very hard to decode by hackers. In addition, the data transferred is
made up of screen pixels, not document files. That is why most of the top web
conferencing vendors do not use a strong encryption algorithm such
as SSL to encrypt the image data in order to avoid performance penalty.
The weakest security point in web conferencing is the access
security. Every web conferencing system today uses meeting ID and/or
password as a simple access security measure to protect unwanted attendance. However, the problem is that the meeting ID/password is
usually emailed to attendees before scheduled meetings start. This
process can easily comprise the access security. Once a hacker
gets/guesses your meeting ID/password, your meeting screen is captured in seconds by the unwanted attendance. It would be too
late to close your meeting once you find such hacking.
Access security is the biggest security issue to all hosted web
conferencing services. Some leading hosted service providers
proudly claim they have the best security simply because they have
deployed the industry standard encryption protocols such as SSL and
AES. This type of security measure only slightly contributes to the transmission security.
|