Indonesi
an
Journa
l
of El
ect
ri
cal
Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
24
,
No.
2
,
N
ov
em
ber
20
21
,
pp.
11
2
1
~
11
29
IS
S
N: 25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v
2
4
.i
2
.
pp
11
2
1
-
112
9
1121
Journ
al h
om
e
page
:
http:
//
ij
eecs.i
aesc
or
e.c
om
E
-
learni
ng virtu
al meeti
ng appli
cations:
A c
ompa
rative s
t
ud
y
from a c
ybers
ec
u
rity pe
rsp
ec
ti
ve
Nader
Ab
del
Ka
ri
m
1
, Ah
m
ed Hussain
A
l
i
2
1
Isra
Univer
sit
y
,
Amm
an,
Jordan
2
Ministr
y
of
Hig
her
Edu
cation an
d
Scie
n
ti
fi
c
R
ese
arc
h,
Studi
es
Pla
nning
and
Follo
w
-
up
Dire
ct
o
rate
,
Baghd
ad, I
raq
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
J
u
n
28
,
2021
Re
vised
A
ug
28
,
2021
Accepte
d
Se
p
2
,
2021
During
the
cor
o
navi
rus
disea
se
2019
(
COV
ID
-
19
)
pande
m
ic
ou
tbre
ak
,
th
e
loc
kdown of
al
l ac
t
ivi
ties i
nc
luding school
s a
nd
unive
rsities be
c
a
m
e
a
norm
al
habi
t
,
forc
ing
ed
uca
t
iona
l
inst
it
ut
es
to
find
new
w
a
y
s
to
ensure
th
e
cont
inu
i
t
y
of
the
le
arn
ing
proc
ess.
E
-
l
ea
rnin
g
is
conside
red
t
he
best
choi
c
e
at
thi
s
stage
where
as
using
vide
o
conf
er
enc
in
g
or
virt
ual
m
ee
t
ing
appl
i
ca
t
ions
(VM
)
apps
is
the
m
ost
comm
on
soluti
on.
I
n
thi
s
r
ese
ar
ch,
sec
urity
issues
a
nd
poss
ibl
e
c
y
b
er
-
a
tt
a
cks
th
at
m
a
y
o
cc
ur
d
ue
to
the
use
of
the
m
ost
popula
r
VM
apps
used
b
y
educat
i
onal
insti
tu
te
s
(i.
e
.
,
Zoom,
Mic
roso
ft
Te
ams
,
and
Google
m
ee
t)
are
discus
sed.
Moreove
r,
t
he
sec
urity
fe
at
u
res
of
the
se
applications
are
brie
fl
y
explain
ed.
Furth
ermore,
a
comprehe
nsive
compari
s
on
from
a
c
y
b
erse
cur
ity
pe
rspec
ti
v
e
bet
we
e
n
VM
apps
was
m
ade
.
The
results
show
tha
t
Google
Mee
t
was
the
m
ost
sec
ure
aga
inst
c
y
b
er
-
attac
ks
,
foll
o
wed
b
y
th
e
Microsoft
T
ea
m
s a
nd
fin
all
y
th
e Zoom
app
.
Ke
yw
or
ds:
E
-
le
ar
ning
Goo
gle Mee
t
Mi
cro
s
of
t Tea
m
s
Secu
rity
User p
rivacy
Virtual m
eet
ing
Zo
om
This
is an
open
acc
ess arti
cl
e
un
der
the
CC
B
Y
-
SA
l
ic
ense
.
Corres
pond
in
g
Aut
h
or
:
Nad
e
r A
bd
el
K
arim
Isr
a
Unive
rsity
,
Amm
an,
Jordan
Em
a
il
: nad
er.sa
lam
eh@
iu.e
du.
j
o
1.
INTROD
U
CTION
Durin
g
the
co
r
on
a
vir
us
disea
se
2019
(
CO
V
ID
-
19
)
pa
nde
m
ic
,
the
ed
uca
ti
on
al
pr
ocess
in
the
whole
world
ha
s
cha
ng
e
d
dram
at
icall
y.
In
2020,
the
Wo
rl
d
E
conom
ic
Fo
rum
m
entioned
that
ov
e
r
1.2
bill
ion
childre
n
ca
nnot
enroll
in
the
s
choolr
oom
[1]
and
this
le
d
t
o
m
or
e
reli
ance o
n
e
-
le
a
rn
i
ng w
he
re
t
he
e
du
c
at
ion
a
l
process
ta
kes
pl
ace
rem
otely
on
di
gital
or
onli
ne
platfo
rm
s
[2]
.
Ed
ucati
on
al
te
chnolo
gy
has
been
im
pr
ov
e
d
i
n
the
la
st
few
de
cades,
a
nd
this
was
gr
eat
ly
va
luable
duri
ng
this
COV
I
D
-
19
pa
nd
em
ic
.
Altho
ug
h
m
any
on
li
ne
platfo
rm
s
that
suppo
rt
E
-
le
a
rn
i
ng
we
re
rea
dy
to
us
e,
it
i
s
not
easy
f
or
ed
ucati
on
ins
ti
tutes
(e.g.
sc
hools,
un
i
ver
sit
ie
s)
to
m
a
n
a
g
e
t
h
e
i
r
e
d
u
c
a
t
i
o
n
a
l
a
c
t
i
v
i
t
i
e
s
i
n
t
h
e
o
n
l
i
n
e
s
p
a
c
e
.
F
u
r
t
h
e
r
m
o
r
e
,
t
e
a
c
he
r
s
a
n
d
s
t
u
d
e
n
t
s
f
a
c
e
d
a
l
o
t
o
f
l
o
g
i
s
t
i
c
,
t
e
c
h
n
i
c
a
l
,
f
i
n
a
n
c
i
a
l
,
a
n
d
s
o
c
i
a
l
c
h
a
l
l
e
n
g
e
s
d
u
e
t
o
t
h
e
u
s
e
o
f
t
h
i
s
k
i
n
d
o
f
e
d
u
c
a
t
i
o
n
(
i
.
e
.
e
-
l
e
a
r
n
i
n
g
)
[3]
.
T
hey starte
d usi
ng V
M a
pps in
ste
ad
of
face
-
to
-
face m
eet
ing
s in
sc
hools a
nd
un
i
ver
sit
ie
s.
V
irtua
l
m
eet
ing
app
li
c
at
ion
s
(
VM
)
i
s
on
e
of
t
he
m
os
t
co
m
m
on
so
luti
ons
that
hav
e
been
a
dopte
d
an
d
s
om
et
i
m
es
ref
e
rr
e
d
to
as
vi
rtual
confere
nc
ing
or
te
le
confere
nces
su
c
h
as
Zoo
m
,
Mi
cro
soft
Team
s,
a
nd
Goo
gle
Me
et
[4]
.
A
VM
a
pp
is
a
n
a
pp
li
cat
io
n
t
hat
is use
d
by p
eo
ple
t
o
m
eet,
no
m
atter
w
he
re
they
are,
it
u
ses v
ide
o,
a
udio,
a
nd
te
xt
to
li
nk
up o
r
m
eet
on
li
ne
rather
tha
n
fac
e
-
to
-
face.
It
al
l
ow
s
d
irect
s
hari
ng
of
i
nfor
m
ation
with
out
the
ne
e
d
to
be
in
the
sa
m
e
plac
e.
Creat
ing
a
VM
roo
m
is
con
side
re
d
cost
-
s
avi
ng
c
om
par
ed
to
w
he
n
ind
i
viduals
travel
to
m
ee
t
on
e
ano
t
her
for
a
sh
ort
tim
e.
It
i
s
le
ss
disruptive
to
sch
ed
ule
s
and
in
-
office
work
[5]
.
W
i
th
th
e
extra
ordina
ry
grow
t
h
of
usi
ng
VM
ap
ps
,
cy
ber
sec
ur
it
y
issues
relat
e
d
to
these
te
chn
i
qu
e
s
sho
ul
d
be
consi
der
e
d.
C
ybersec
ur
it
y
is
fo
c
us
in
g
on
the
pract
ic
e
of
def
e
nd
i
ng
i
nfor
m
a
ti
on
,
op
e
rati
ons,
and
com
m
un
ic
at
ion
s
f
ro
m
at
ta
cks.
The
m
ai
n
go
al
of
cy
ber
se
cur
it
y
is
m
ai
nt
ai
nin
g
t
he
integrity
,
co
nf
i
dent
ia
li
t
y,
pr
i
vacy,
a
uth
e
ntica
ti
on
,
a
nd
avail
abili
ty
of
any
in
form
at
i
on
syst
em
[6
]
,
[7
]
.
The
us
e
of
VM
te
c
hniqu
es
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
2
4
, N
o.
2
,
N
ove
m
ber
20
21
:
11
2
1
-
112
9
1122
pr
ese
nts
m
any
secur
it
y
issues
w
h
i
c
h
v
a
r
y
f
r
o
m
u
n
e
n
c
r
y
p
t
e
d
c
om
m
u
n
i
c
a
t
i
o
n
f
o
r
f
r
e
e
a
c
c
o
u
n
t
s
t
o
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
t
h
a
t
p
e
r
m
i
t
m
a
l
w
a
r
e
e
x
e
c
u
t
i
on
o
n
u
s
e
r
s
’
d
e
v
i
c
e
s
.
F
u
r
t
h
e
r
m
o
r
e
,
t
h
e
u
s
e
o
f
V
M
a
p
p
s
h
a
s
i
n
c
r
e
a
s
e
d
p
r
i
v
a
c
y
a
n
x
i
e
t
i
e
s
t
h
a
t
c
o
u
l
d
a
l
l
o
w
u
n
i
n
v
i
t
e
d
u
s
e
r
s
t
o
j
o
i
n
m
e
e
t
i
n
gs
b
y
g
u
e
s
s
i
n
g
m
e
e
t
i
n
g
I
D
s
o
r
b
y
j
u
s
t
l
o
o
k
i
n
g
f
o
r
m
e
e
t
i
n
g
l
i
n
k
s
t
h
a
t
w
e
r
e
s
h
a
r
e
d
p
u
b
l
i
c
l
y
s
u
c
h a
s
s
o
c
i
a
l
m
e
d
i
a
w
e
b
p
a
g
e
s
[8]
.
M
o
r
e
s
p
e
c
i
f
i
c
a
l
l
y
,
u
s
i
n
g
V
M
a
p
p
s
i
s
v
u
l
n
e
r
a
b
l
e
t
o
m
a
ny
s
e
c
u
r
i
t
y
a
n
d
p
r
i
v
a
c
y
r
i
s
k
s
,
s
u
c
h
a
s
t
h
o
s
e
r
e
l
a
t
e
d
t
o
s
oc
i
a
l
n
e
t
w
o
r
k
s
w
h
i
c
h
i
n
c
l
u
d
e
h
i
j
a
c
k
i
n
g
,
s
c
r
e
e
n
s
h
a
r
i
n
g
,
i
n
f
o
r
m
a
t
i
o
n
d
i
s
c
l
o
s
u
r
e
a
n
d
a
s
s
o
c
i
a
t
i
o
n
,
m
a
l
w
a
r
e
,
p
h
i
s
h
i
n
g
,
f
a
c
e
r
e
c
o
g
n
i
t
i
o
n
,
d
a
t
a
b
r
e
a
c
h
,
a
n
d
z
o
om
b
om
b
i
n
g
a
t
t
a
c
k
s
.
This
m
anu
scri
pt
is
or
gan
iz
e
d
as
f
ollow
s
.
Sect
ion
2
pres
ents
the
bac
kg
rou
nd
i
n
wh
ic
h
the
relat
ed
works,
vi
rtual
m
eet
ing
app
s
,
secur
it
y
featu
r
es,
an
d
secu
rity
and
pri
vacy
issues
are d
isc
usse
d.
Sect
io
n
3
cov
e
r
s
the
m
e
tho
d
a
dopte
d
f
or
t
he
e
valuati
on
of
th
e
VM
ap
ps
in
t
his
stu
dy.
Sect
ion
4
hi
gh
li
ght
s
the
res
ults
aft
er
the
evaluati
on
of
t
he
VM
a
pps.
Sect
ion
5
pres
ents
the
discussi
on
of
t
he
res
ult
of
s
ect
io
n
4.
Finall
y,
s
ect
ion
6
include
s the
conclusi
on and
f
uture
work.
2.
BACKG
ROU
ND
This
sect
ion
presents
the
r
el
at
ed
wor
ks
th
at
hav
e
disc
usse
d
the
VM
a
pp
s
.
It
al
so
gi
ves
a
br
ie
f
exp
la
natio
n
of
Zo
om
,
Goo
gle
Me
et
,
an
d
M
ic
ro
s
of
t
Te
am
s
ap
ps
.
The
sec
ur
it
y
feat
ur
es
and
issue
s
ass
ociat
ed
with the
use
of these a
pps a
re
al
so
discuss
e
d.
2.1
.
Rela
ted
w
orks
Secu
rity
and
use
r
pr
i
vacy
are
ver
y
i
m
po
rtan
t
issues
in
the
on
li
ne
e
nv
i
ron
m
ent.
Fu
rt
her
inv
e
sti
gatio
n
is
need
e
d
to
i
m
pr
ov
e
the
se
cur
it
y
of
VM
apps
in
the
E
-
le
arn
in
g
sect
or.
This
sect
io
n
dem
on
strat
es
s
om
e
arti
cl
es
that
fo
cuse
d
on
the
s
ecur
it
y
a
nd
pr
i
vacy
issues
du
e
to
the
us
e
of
VM
ap
ps
.
Ma
hr
et
al.
[9]
pe
rfor
m
ed
a
detai
le
d
fo
re
ns
ic
analy
sis
on
the
pr
im
ary
disk,
netw
ork,
and
m
e
m
or
y
of
the
Z
oo
m
VM
app.
The
resu
lt
s
sh
ow
that
us
er
pe
rsonal
i
nform
at
ion
m
ay
be
f
ound
in
it
s
e
xp
li
ci
t
an
d/or
encr
y
pted
f
orm
,
li
ke
chat
m
essages
,
nam
es,
e
m
ail
addresses
,
an
d
pass
words.
W
hile
us
in
g
network
capt
ur
es
,
forensi
c
i
m
aging
of
dig
it
al
dev
ic
es
,
and
m
e
m
or
y
fo
re
ns
ic
s.
Li
ng
et
al.
[10]
re
cognized
10
popula
r
VM
to
ols
an
d
pull
ou
tp
os
ts
that
con
ta
i
n
inv
it
at
ion
s
t
o
m
eet
ing
s
on
t
wo
s
ocial
net
works
(i.e.
T
w
it
te
r
and
4c
ha
n).
T
hen
they
do
m
anu
al
anno
ta
ti
on
to
recog
nize
zo
om
bo
m
bin
g
at
ta
ck
posts
a
nd
then
a
pp
ly
the
m
at
ic
analy
sis
to
est
ablish
a
cod
e
book
t
o
enh
a
nce
and
c
har
act
e
rize
the
discussi
on
s
urrou
nd
i
ng
cal
ls
f
or
z
oo
m
bo
m
bin
g.
The
fin
di
ng
s
sh
ow
that
m
os
t
of
zoo
m
bo
m
bin
g
c
al
ls
are
no
t
est
ablished
by
an
ad
ver
sa
ry
stum
bling
upon
m
eet
ing
inv
it
at
ion
s
or
brute
-
f
or
ci
ng
their
m
eeting
I
D,
bu
t
act
ually
throu
gh
le
giti
m
at
e
per
sons
(
i.e.,
insi
der
s
)
who
hav
e
acce
ss
to
these
m
e
et
ing
s
,
especial
ly
stude
nts
in
the
ed
uc
at
ion
al
insti
tutes.
Th
is
has
s
erio
us
secu
rity
i
m
plica
t
ion
s
be
cause
it
m
akes
the
protect
ion
m
eth
ods
us
e
d
aga
inst
zo
om
bo
m
bing,
li
ke
pas
swor
d
protect
ion,
us
el
ess.
A
rch
i
bald
et
al.
[
11]
stud
ie
d
the u
se
o
f
the Zoom
f
or
o
nline quali
ta
ti
ve
interview
s o
f
nur
ses exp
eriences and r
e
search ob
s
er
va
ti
on
s
.
Re
gardin
g
the
secur
it
y
issue
,
the
a
uthors
r
eveal
that
the
Zo
om
app
can
secure
ly
recor
d
an
d
st
or
e
se
ssions
especial
ly
wh
e
n
the
protect
io
n
of
se
ns
it
ive
data
is
essenti
a
l.
More
ov
e
r,
use
r
-
s
pecific
a
uth
entic
at
io
n,
re
al
-
tim
e
encr
y
ption
of
m
eet
ing
s,
an
d
the
abili
ty
to
back
up
rec
ordi
ngs
to
onli
ne
re
m
ote
serv
er
ne
tworks
a
re
incl
ud
e
d.
Si
m
ple
pr
i
vac
y
and
sec
ur
it
y
op
ti
ons
that
e
na
ble
the
use
r
to
easi
ly
a
nd
se
cur
el
y
lo
g
into
Zo
om
represe
nt
the
key stren
gt
hs
of the
Z
oom
ap
p.
T
his stu
dy di
d
not sh
ow any
secur
it
y i
ssue
s due to
a
pp fe
at
ur
es li
ke
t
he
ab
il
it
y
to
sel
ect
ively
i
nv
it
e
use
rs
a
nd
m
on
it
or
in
g
t
he
distri
bu
ti
on
of
m
eet
ing
acce
ss
data.
Kagan
et
al.
[
8]
ex
plore
d
and
a
naly
zed
t
he
pr
i
vacy
iss
ue
s
t
hat
m
ay
exist
throu
gh
us
in
g
VM
by
extracti
ng
pr
i
va
te
info
rm
at
ion
from
i
m
ages
of
Z
oo
m
m
ee
ti
ng
m
e
m
ber
s
that
are
po
ste
d
on
t
he
web
publica
ll
y.
The
res
ult
of
this
stud
y
s
howed
t
hat
vid
e
o
co
nfere
nc
e
us
er
s
face
d
sever
al
pr
i
vac
y
threats
beca
us
e
of
e
xtracti
ng
p
e
rsonal
in
form
ation
a
bout
the
par
ti
ci
pa
nts
by
an
easy
wa
y
of
colle
ct
in
g
th
ou
sa
nds
of
existi
ng
im
a
ges
of
vid
e
o
confere
nce
m
e
et
ing
s
includi
ng
m
e
m
ber’s
face
im
a
ges,
a
ge,
gend
er,
use
r
nam
es,
and
s
om
et
i
m
es
even
fu
ll
nam
es.
Furthe
rm
or
e,
the
extracti
ng d
at
a
can
pu
t t
he
se
cur
it
y and
pr
i
va
cy
o
f
the m
e
m
ber
s at risk.
H
owe
ver, this r
esearc
h
f
oc
use
d
on the
pr
i
vacy
issue
of
Z
oo
m
app
on
ly
.
K
ristó
f
[
12
]
disc
us
se
d
the
m
easur
es
enfor
ce
d
in
m
any
co
un
trie
s
about
distance
ed
uca
ti
on
.
Mo
reove
r,
the
pro
pose
d
so
l
ution
s
tha
t
wer
e
desig
ne
d
to
m
anag
e
t
he
distance
le
arn
i
ng
process
a
nd
it
s
char
act
erist
ic
s
and
par
am
et
e
rs
we
re
highli
gh
t
e
d
in
this
s
tud
y
(
i.e.
,
Sk
y
pe,
Z
oo
m
,
Micro
s
oft
Team
s,
and
G
oogle
Me
et
)
.
T
he
st
ud
y
re
vea
le
d
that
t
her
e
a
re
sec
ur
it
y
vul
ner
a
bili
ti
es
an
d
poor
a
pp
ea
ra
nce
in
Zo
om
app
s
an
d
they
co
uld
be
reso
l
ved
by
inclu
ding
pa
ss
words
an
d
e
nhanced
e
nc
ryption.
Disc
us
sio
n
of
th
e
secur
it
y
of
t
he
othe
r
t
wo
a
pps
was
li
m
it
ed.
Kh
a
n
et
al.
[
13]
ide
ntifie
d
t
he
cy
bersec
uri
ty
threats
a
nd
pri
vacy
co
nce
r
ned
that
m
a
y
occur
usi
ng
VM
a
pps
duri
ng
t
he
pa
nde
m
ic
,
COVID
-
19,
at
Healt
hca
re
Syst
em
s,
fin
ancial
serv
ic
es
a
nd
gove
rn
m
ent
and
m
edia
ou
tl
et
s
sect
or
s
.
T
he
th
reats
tha
t
wer
e
disc
usse
d
in
this
st
ud
y
a
re
distrib
uted
de
nial
of
ser
vice
(D
D
oS),
m
al
ic
iou
s
do
m
ai
n
s,
m
a
li
ci
ou
s
web
sit
es,
m
al
war
e,
ra
nso
m
war
e
cy
ber
crim
inals,
sp
am
e
m
ails,
m
alici
ou
s
so
ci
al
m
edia
m
ess
agin
g,
busin
es
s
e
m
ai
l
co
m
pr
om
ise
,
m
ob
il
e
threats
and
bro
wsing
Apps.
H
ow
e
ve
r,
the
st
udy
did
no
t
li
nk
a
ny
threats
with
any
VM
ap
ps
.
It
was
a
ge
ner
a
l
discuss
i
on
for
po
te
ntial
threats
that
m
ay
occu
r
wh
e
n
us
i
ng
VM
ap
ps
.
T
he
adv
a
ntage
s
an
d
lim
it
a
ti
on
s
of
us
in
g
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c
En
g
&
Co
m
p
Sci
IS
S
N:
25
02
-
4752
E
-
le
arnin
g
vi
rt
ua
l
meeti
ng
applicati
ons: A c
omp
ar
ative
st
udy fr
om a cybe
rsecurit
y
…
(
Nad
e
r A
bd
el
K
ari
m
)
1123
the
prefe
ra
ble
apps
in
the
m
eet
ing
of
acade
m
ic
gr
ou
ps
(i.e
.
Z
oo
m
and
pri
vate
Face
book
gro
up)
a
re
stu
di
ed
by
auth
or
s
in
[
14
]
.
T
his
stu
dy
c
oncl
udes
t
hat
a h
yb
rid
form
at
pr
i
vate
Face
boo
k
gr
oup
pro
vi
des
m
or
e
s
uitable
a
nd
sat
isfyi
ng
res
ult
than
Zoo
m
in
te
r
m
s
of
the
facil
it
at
or
of
a
un
i
qu
e
,
healt
h
-
relat
ed,
na
rr
at
i
ve
researc
h
gr
oup
at
the
insti
tuti
on
-
a
gro
up
ta
il
ore
d
to
c
riti
cal
tho
ug
ht,
c
omm
u
nicat
ion
,
co
op
erati
on,
an
d
c
r
eat
ivit
y.
Howe
ver,
t
he
discuss
i
on o
f
t
he
secu
rity
o
f
these tw
o
ap
ps
was
lim
it
ed.
Singh and Awast
hi
[15]
pro
vid
e
a co
m
par
at
ive st
ud
y
of
vid
e
o
c
onf
eren
ci
ng
a
pps
relat
ed
to
G
oogle
Me
et
,
Z
oom
,
Mi
cro
soft
Team
s,
Ci
sco
W
e
bEx
Tea
m
s
and
GoToMeet
in
g.
This
com
par
ison
i
nclu
des
the
featu
res
of
secur
it
y
an
d
pri
vacy
issues.
Howe
ver,
the
auth
or
sta
te
s
that
ther
e
are
sec
ur
it
y
issues
of
us
in
g
Z
oo
m
a
pp
s
without
giv
in
g
any
detai
ls,
a
lt
ho
ug
h
the
se
cur
it
y
featur
e
s
of
t
he othe
r
a
pp
s
are
dem
on
strat
ed
.
By
rev
ie
wing
t
he
ab
ove
stu
dies,
we
m
ay
co
m
e
to
the
con
c
lusio
n
that
som
e
stud
ie
s
[8
]
,
[11],
[
14
]
ar
e
ded
ic
at
e
d
to
di
scussing
the
featur
e
s,
sec
uri
ty
,
and
pr
iva
cy
issues
of
a
par
ti
cula
r
ap
p
(i.e
.
Z
oo
m
).
Othe
r
stud
ie
s
[12],
[
15
]
,
howe
ver,
gav
e
ge
ner
al
i
nfor
m
at
ion
ab
ou
t
the
featu
re
s
an
d
secu
rity
of
VM
ap
ps
,
wh
il
e
stud
ie
s
li
ke
[
8]
,
[13]
,
highli
ghte
d
the
t
hr
eat
s
faced
by
th
e
VM
ap
ps
re
ga
rd
le
ss
of
t
he
app
us
e
d.
M
oreov
e
r,
so
m
e
stud
ie
s
[9
]
,
[10]
fo
c
us
e
d
on
certai
n
ty
pe
s
of
at
ta
cks
(i.e.
zo
om
bo
m
bin
g
and
dat
a
br
eac
h)
that
coul
d
at
ta
ck
Zo
om
an
d ot
her VM a
pp
s
.
2.2.
Virtu
al
meeting
apps
W
it
h
the
dram
at
ic
gr
owth
of
us
in
g
virt
ual
m
eet
ing
app
s
,
m
any
crit
eria
s
hould
be
co
ns
i
der
e
d
to
pic
k
the s
uitable
VM
app whic
h
i
nclu
de:
Co
st:
cu
st
om
izing
us
e
r need
s
within
budget
s
.
Me
et
ing
durati
on
: a
vaila
ble ti
m
e p
r
ov
i
ded f
or eac
h
m
eet
ing
.
Com
patibil
i
ty
:
with all
p
la
tf
or
m
s an
d
al
l t
ypes of
dev
ic
es
Pu
r
pose:
s
om
e apps are
d
e
sig
ned f
or p
a
rtic
ul
ar purp
os
es.
In
te
gr
at
io
n: a
pps s
houl
d work well
with
o
t
he
r
a
pp
s
.
The n
um
ber
of
p
a
rtic
ipants:
di
ff
ers
fro
m
o
ne
V
M a
pp to
anothe
r.
Usab
il
it
y:
u
ser
-
f
rien
dly for e
f
fecti
ven
es
s,
e
ffi
ci
ency, and sa
ti
sfacti
on
.
Secu
rity
: ro
bus
t for
us
er
s’ dat
a an
d
m
ai
ntain p
ri
vacy.
Ov
e
r
the
ye
a
rs
,
there
ha
ve
be
en
m
any
popu
l
ar
VM
a
pps
in
cl
ud
in
g
Z
oom
,
Mi
cro
s
of
t
Tea
m
s,
Go
ogle
Me
et
(H
a
ngou
ts),
S
kype
,
A
dobe
Co
nnect
,
Ci
sco
W
e
bex,
and
F
reeco
nfer
encecal
l.
Ba
se
d
on
[
12]
Z
oom
,
MS
Team
s,
and
Goog
le
Mee
t
were t
he
m
os
t fr
e
quently
used
VM
apps in
E
-
le
arn
i
ng.
2.2.1. Z
oom
Z
o
o
m
i
s
a
n
A
m
e
r
i
c
a
n
c
om
m
u
n
i
c
a
t
i
o
n
s
t
e
c
h
n
o
l
o
g
y
c
om
p
a
ny
.
I
t
s
u
p
p
l
i
e
s
o
n
l
i
n
e
c
h
a
t
t
i
n
g
s
e
r
v
i
c
e
s
o
v
e
r
a
c
l
o
u
d
-
b
a
s
e
d
l
i
v
e
c
a
l
l
i
n
g
a
p
p
l
i
c
a
t
i
o
n
t
h
a
t
i
s
u
s
e
d
f
o
r
v
i
r
t
u
a
l
m
e
e
t
i
n
g
s
,
d
i
s
t
a
n
c
e
l
e
a
r
n
i
n
g
,
a
n
d
s
o
c
i
a
l
n
e
t
w
o
r
k
s
[12]
.
Z
o
o
m
h
a
s
b
e
c
om
e
t
h
e
m
o
s
t
po
p
u
l
a
r
a
p
p
f
o
r
t
h
e
e
d
u
c
a
t
i
o
n
s
e
c
t
o
r
a
n
d
m
o
r
e
t
h
a
n
5
0
0
c
om
p
a
n
i
e
s
u
s
e
d
i
t
d
u
r
i
n
g
2
0
1
9
a
n
d
2
0
2
0
.
T
h
i
s
n
um
b
e
r
h
a
s
b
e
e
n
i
n
c
r
e
a
s
e
d
d
r
a
m
a
t
i
c
a
l
l
y
s
i
n
c
e
3
0
0
m
i
l
l
i
o
n
u
s
e
r
s
p
a
r
t
i
c
i
p
a
t
e
i
n
t
h
e
Z
o
om
a
p
p
d
a
i
l
y
[16]
,
[17]
.
Z
o
o
m
h
a
s
m
a
n
y
f
e
a
t
u
r
e
s
s
u
c
h
a
s
c
om
p
a
t
i
b
i
l
i
t
y
,
o
n
e
-
on
-
o
n
e
m
e
e
t
i
n
g
s
,
g
r
o
u
p
v
i
d
e
o
c
o
n
f
e
r
e
n
c
e
s
,
s
c
r
e
e
n
s
h
a
r
i
n
g
,
m
e
e
t
i
n
g
i
n
v
i
t
e
e
s
d
o
n
o
t
n
e
e
d
t
o
d
o
w
n
l
o
a
d
a
n
y
a
p
p
l
i
c
a
t
i
o
n
t
o
a
t
t
e
n
d
t
h
e
m
e
e
t
i
n
g
.
T
o
j
o
i
n
a
m
e
e
t
i
n
g
,
i
t
i
s
s
u
f
f
i
c
i
e
n
t
t
o
c
l
i
c
k
o
n
t
h
e
s
e
n
d
l
i
n
k
i
f
t
h
e
y
u
s
e
C
h
r
om
e
a
nd
F
i
r
e
f
o
x
b
r
o
w
s
e
r
s
.
T
h
e
i
n
v
i
t
e
e
s
a
r
e
n
o
t
r
e
q
u
i
r
e
d
t
o
c
r
e
a
t
e
a
c
c
o
u
n
t
s
o
n
t
h
e
a
p
p
l
i
c
a
t
i
o
n
.
M
o
r
e
o
v
e
r
,
Z
o
o
m
s
t
a
n
d
a
r
d
i
s
4
0
m
i
n
u
t
e
s
f
r
e
e
,
1
0
0
p
a
r
t
i
c
i
p
a
n
t
s
m
a
x
[18]
.
H
o
w
e
v
e
r
,
t
h
e
Z
o
om
a
p
p
s
u
f
f
e
r
e
d
f
r
om
s
e
c
u
r
i
t
y
f
l
a
w
s
a
n
d
p
o
o
r
a
p
p
e
a
r
a
n
c
e
.
T
h
e
c
om
p
a
n
y
a
p
o
l
og
i
z
e
d
f
o
r
t
h
e
s
e
s
e
c
u
r
i
t
y
i
s
s
u
e
s
i
n
A
p
r
i
l
2
0
2
0
,
c
l
a
i
m
i
n
g
t
h
a
t
t
h
e
s
e
i
s
s
u
e
s
a
r
o
s
e
b
e
c
a
u
s
e
t
h
e
a
p
p
l
i
c
a
t
i
o
n
w
a
s
n
o
t
d
e
s
i
g
n
e
d
p
r
i
m
a
r
i
l
y
f
o
r
e
-
l
e
a
r
n
i
n
g
.
Z
o
o
m
h
a
s
a
n
n
o
u
n
c
e
d
a
f
o
c
u
s
o
n
p
r
i
v
a
c
y
a
n
d
t
r
a
n
s
p
a
r
e
n
c
y
i
s
s
ue
s
;
s
o
,
i
n
A
p
r
i
l
2
0
2
0
,
v
e
r
s
i
o
n
5
.
0
o
f
Z
o
o
m
w
a
s
r
e
l
e
a
s
e
d
i
n
w
h
i
c
h
m
a
n
y
s
e
c
u
r
i
t
y
a
n
d
p
r
i
v
a
c
y
i
s
s
u
e
s
w
e
r
e
s
u
c
c
e
s
s
f
u
l
l
y
r
e
s
o
l
v
e
d
.
P
a
s
s
w
o
r
d
s
,
e
n
h
a
n
c
e
d
e
n
c
r
y
p
t
i
o
n
,
a
n
d
a
n
e
w
s
e
c
u
r
i
t
y
i
c
o
n
w
e
r
e
i
n
c
l
u
d
e
d
i
n
t
h
e
n
e
w
Z
o
o
m
a
p
p
v
e
r
s
i
o
n
[
1
2
]
.
2.2.2. Mi
cro
soft
Te
ams
Mi
cro
s
of
t
(M
S)
create
d
the
Team
s
app
in
Ma
rc
h
20
17
in
New
Y
ork
and
la
un
c
he
d
it
s
serv
ic
e.
Mi
cro
s
of
t
Tea
m
s
is
essenti
ally
ta
rg
et
ed
f
or
te
am
s,
cl
asses
or
gro
up
s
to
c
ollaborat
e,
sh
a
re
a
nd
chat
.
B
esi
des
te
xt
chat,
vid
e
o
cal
ls
and
scr
een
sh
a
re
are
a
lso
suppo
rted.
Mi
cro
s
of
t
re
ported
that
MS
Tea
m
s
no
w
has
arou
nd
44
m
illi
on
use
rs
[
12
]
.
It
a
ll
ow
s
com
m
un
it
ie
s
and
gro
up
s
t
o
join
li
nk
s
or
in
vitat
ion
s
us
in
g
a
gro
up
adm
inist
rator
or
owne
r.
A
dm
inist
rator
s
a
nd
te
ache
rs
ca
n
ge
ner
at
e
groups
f
or
cl
asses,
professi
onal
le
arn
i
ng
com
m
un
it
ie
s
a
nd
em
plo
ye
es.
W
it
hin
t
he
MS
Team
s
app
,
us
ers
can
set
up
c
ha
nn
el
s
t
ha
t
are
co
nv
e
rs
at
ion
top
ic
s
t
o
com
m
un
ic
at
e
witho
ut
em
ai
l
or
gro
up
SMS.
MS
Team
s
also
help
te
ac
he
rs
to
distri
bute
,
give
feedbac
k
on
and
cl
assify
st
ud
e
nt
m
at
erials
on
the
assi
gnm
ents
ta
b
wh
ic
h
is
offe
re
d
to
the
O
ff
ic
e
365
Ed
ucati
on
s
ub
scribe
rs.
Teac
he
rs
can
al
s
o
m
ake
Q
uizzes
f
or
stu
den
ts
t
hr
ough
inte
gr
at
io
n
with
Office
Fo
rm
s
[12]
,
[
19
]
.
Howev
e
r,
the
re
is
so
m
e
l
i
m
it
a
ti
on
since
the
structu
re
of
file
s
confuses
us
ers
a
nd
prov
i
de
s
chall
enges
r
e
gardin
g
per
m
i
ssion
set
ti
ngs,
add
i
ng
m
e
m
ber
s
from
outsi
de
the
org
anizat
ion,
rec
ei
ving
no
ti
ficat
io
ns
a
nd se
nd
i
ng m
ultim
edia file
s thro
ugh
t
he
a
pp
[
20
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
2
4
, N
o.
2
,
N
ove
m
ber
20
21
:
11
2
1
-
112
9
1124
2.2.3. Go
ogle
Meet
Goo
gle
Me
et
(
form
erly
Han
gouts
)
is
a
vi
de
o
-
com
m
un
ic
at
ion
ser
vice
dev
el
op
e
d
by
G
oogl
e
[21]
.
T
he
us
e
of
Me
et
increased
betwee
n
Jan
uar
y
an
d
April
2020
dur
ing
the
20
20
C
OVID
-
19
pand
e
m
ic
,
reachin
g
100
m
illi
on
us
e
rs
a
day
in
the
la
st
week
of
A
pr
i
l
2020
[
12
]
.
G
oogle
prov
i
des
a
60
m
inu
te
s
lim
it
fo
r
up
to
10
0
par
ti
ci
pa
nts
f
or
f
ree
acc
ounts
.
H
oweve
r,
e
ve
ryo
ne
j
oi
ning
the
m
eet
ing
m
us
t
sign
in
with
a
G
oogle
acco
un
t
[8]
.
Me
et
ap
p
has
been
dow
nl
oad
e
d
m
illi
on
s
of
ti
m
es
fr
om
Play
store
w
her
e
w
ork
-
fro
m
-
ho
m
e
nu
m
ber
s
ha
ve
grown
thr
ough
the
C
OVI
D
-
1
9
pandem
ic
per
io
d.
Since
Ja
nu
a
ry,
Me
et
’
s
peak
daily
us
a
ge
has
gro
w
n
by
30
tim
es,
accord
i
ng
to Google
[
22]
.
Jo
i
ning
a
m
eet
ing
re
quires
no
ap
p
t
o
do
w
nlo
a
d;
rath
er,
a
ny
we
b
browse
r
can
be
us
e
d
to
joi
n.
To
join
a
m
eet
ing
thr
ou
gh
m
ob
il
e
via
I
OS
a
nd
Android
with
scr
een
s
har
i
ng
a
nd
16
par
ti
ci
pa
nts
on
a
sing
le
scree
n,
a
pp
s
s
houl
d
be
dow
nlo
a
de
d.
E
ncr
y
ption,
anti
-
hi
j
acki
ng
and
phishin
g,
2
-
ste
p
ver
ific
at
io
n AP
P,
a
nd 2SV
are
provide
d by
Me
et
to
co
ntr
ol
an
d sa
ve
th
ose
who acc
ess t
he
a
pp
[
8]
.
2.3.
Sec
urit
y fea
tu
res
Fo
ll
owin
g
up
t
he
cy
be
rsecurit
y
pr
oc
ed
ur
e
s
in
the
rig
ht
m
a
nn
e
r
ca
n
hel
p
us
ers
t
o
keep
out
unwa
nted
at
te
nd
ees,
sec
ure us
ers
’
data
a
nd
pri
vacy.
S
om
e
featur
es
tha
t
can b
e h
el
pfu
l
for
us
er
s
to
m
anag
e
sec
ur
e
a
ccess
to V
M
ap
ps
a
nd
gen
e
ral re
co
m
m
end
at
ion
a
r
e as foll
ows
[23]
:
Me
et
ing
IDs a
nd Pass
wor
ds
:
T
o
p
r
e
v
e
n
t
u
n
a
u
t
h
o
r
i
z
e
d
u
s
e
r
s
,
m
e
e
t
i
n
g
I
D
s
s
h
o
u
l
d
n
o
t
b
e
p
u
b
l
i
c
l
y
s
h
a
r
e
d
a
n
d
a
u
n
i
q
u
e
,
s
t
r
o
n
g
p
a
s
s
w
o
r
d
o
f
a
t
l
e
a
s
t
1
2
u
p
p
e
r
c
a
s
e
a
n
d
l
o
w
e
r
c
a
s
e
l
e
t
t
e
r
s
,
n
u
m
b
e
r
s
,
a
n
d
s
y
m
b
o
l
s
s
h
o
u
l
d
b
e
s
e
t
f
o
r
t
h
e
m
e
e
t
i
n
g
.
T
w
o
-
f
a
c
t
o
r
a
u
t
h
e
n
t
i
c
a
t
i
o
n
p
r
o
v
i
d
e
s
a
n
o
t
h
e
r
l
a
y
e
r
o
f
p
r
o
t
e
c
t
i
o
n
b
y
d
e
l
i
v
e
r
i
n
g
c
o
d
e
t
o
t
h
e
u
s
e
r
’
s
s
i
m
c
a
r
d
o
r
e
m
a
i
l
.
Encr
y
ption
:
T
he
m
os
t im
po
rtant f
eat
ur
e to ta
ke
into acco
unt t
o
encr
ypt t
he
m
eet
ing
r
eso
urces wh
e
n
us
i
ng
the V
M
apps is
the e
ncr
y
ption al
gorithm
s (
for
e
xam
ple, A
E
S)
with
keys
of 128,
256, 40
96, a
nd s
o o
n.
Ma
nag
e
Jo
i
ning
a
nd
Ca
ll
s
:
The
host
sho
uld
co
ntr
ol
the
jo
ining
an
d
cal
l
s
to
i
den
ti
fy
unkn
own
phone
nu
m
ber
s.
VM
Me
et
ing
Apps
Sett
in
g
:
These
ca
n
im
p
rove
the
sec
ur
i
ty
.
Alerts
can
be
est
ablishe
d
so
the
ho
st
knows
wh
e
n
m
eet
ing
inv
it
at
ion
s
are
sent
ove
r
em
ail
to
pa
rtic
ipant
s.
Ot
her
tha
n
t
he
m
eet
ing
co
ordinat
or
or
ho
st,
par
ti
ci
pa
nts
can
be
blo
c
ked
from
reco
rd
i
ng
the
m
eeting
,
or
to
ide
ntify
wh
ic
h
par
ti
ci
pan
t
ha
s
sta
rted
recordi
ng.
Fil
e
sh
arin
g
can
be
restrict
ed
so
that
anonym
ou
s
par
ti
ci
pan
ts
cannot
open
or
receive
pr
i
vate
do
c
um
ents
or
tran
sm
it
m
al
wa
re
m
asked
as
an
at
ta
chm
ent
t
o
oth
e
r
par
ti
ci
pan
ts
of
the
cal
l
as
the
web
ca
m
on
a
us
e
r’s
de
vice
m
ay
be
us
e
d
by
intrud
ers
as
a
too
l
to
sp
y
on
the
par
ti
ci
pa
nt
util
iz
ing
m
a
li
ci
ou
s
so
ft
war
e
t
hat
infects
par
ti
ci
pa
nt
de
vices.
E
xp
ect
at
io
ns
for
pr
i
vacy
set
ti
ng
s
s
hould
be
a
ppr
ov
e
d
by
th
e
gro
up or c
ollea
gu
e
s to
en
s
ure
com
m
un
ic
at
ion
s a
re s
ec
ur
e
on bot
h
e
nds.
Be
sides
the
above
feat
ur
es
,
there
are
som
e
reco
m
m
end
at
ions
for
use
rs
that
us
e
d
VM
apps
that
sh
oul
d be take
n
int
o
c
onsider
at
ion
:
Fil
es an
d
li
nks: C
li
cking
li
nks
and att
achm
ents in
a
nonym
ous em
ails sh
oul
d be a
vo
i
ded.
Use
E
nter
pri
se
Lic
ense:
Acc
ess
the
VM
ap
ps
by
purc
hasing
an
e
nter
pr
i
se
li
cense
t
hat
give
s
us
er
s
m
or
e
con
t
ro
l a
nd e
nsures
sec
ur
it
y and p
rivacy.
In
sta
ll
secu
rity
so
ft
war
e:
Be
y
ond
m
anag
in
g
the
set
t
ing
s
of
the
VM
a
pps,
instal
l
secur
it
y
so
ft
war
e
on
t
he
dev
ic
es
.
Avoid o
pe
n
m
eet
ing
s:
Nev
e
r use a
n o
pen VM
app.
T
hey
m
ake it easy
fo
r
at
ta
cke
rs
to
join
i
n.
2.4.
VM
app
s securit
y an
d
priva
c
y
iss
ues
User
s
c
omm
on
ly
rep
rese
nt
th
e
weak
e
st
li
nk
in
the
sec
ur
it
y
chain
[24]
.
S
o,
the
us
e
r'
s
pr
iv
at
e
secur
it
y
wh
e
n
us
i
ng
V
M
ap
ps
dep
e
nds
on
the
us
e
r
him
sel
f.
W
he
n
a
us
e
r
j
oi
ns
a
cal
l
thr
ough
on
e
VM
ap
p
f
ro
m
an
un
s
ecu
red
de
vice
or
c
onnecti
on,
he
bec
om
e
s
vu
l
ner
a
ble
to
un
a
uthorize
d
acce
ss.
Th
e
m
ai
n
point
in
V
M
apps
is secure
acces
s,
w
hich
m
eans avoidin
g
t
he
a
nnoyin
g
int
rud
er fro
m
en
r
olli
ng and
gaini
ng acc
ess to
the
da
ta
o
r
dev
ic
es
of a
ny
par
ti
ci
pa
nt on
t
he
m
eet
ing
. VM
ap
ps l
ike Z
oom
, G
oogle M
eet
, and
Mi
cr
osoft Te
am
s can
m
ake
it
easy
to
m
eet
your
te
ac
her
s
,
cl
assm
a
te
s,
w
ork
groups,
f
rie
nd
s
,
a
nd
fam
ily
m
e
m
ber
s.
H
ow
e
ve
r,
t
hat
e
ase
of
transm
issi
on
m
igh
t al
s
o
m
ak
e the m
issi
on
o
f
reachi
ng the i
nfo
rm
ation
easi
er for at
ta
ckers
. Th
e
m
ai
n
idea is t
o
be
awa
re
of
t
he
secur
it
y
ris
ks
befo
re
getti
ng
on
a
vid
e
o
cal
l
with
your
wor
k
te
am
or
gro
up
of
fr
ie
nd
s
by
set
ti
ng
up the
f
eat
ur
es
of the
VM apps
corre
ct
ly
to
kee
p
m
a
lware,
h
ac
kers,
and ide
ntit
y t
hi
eves
ou
t.
P
r
i
v
a
c
y
i
s
a
n
o
t
h
e
r
c
o
n
c
e
r
n
.
T
h
e
p
r
i
v
a
c
y
p
o
l
i
c
i
e
s
o
f
V
M
a
p
p
s
c
o
u
l
d
e
n
a
b
l
e
t
h
e
s
e
r
v
i
c
e
s
t
o
c
o
l
l
e
c
t
a
n
d
s
t
o
r
e
a
l
o
t
o
f
d
a
t
a
f
r
o
m
m
a
n
y
r
e
s
o
u
r
c
e
s
(
e
.
g
.
,
c
l
o
u
d
r
e
c
o
r
d
i
n
g
s
,
v
i
d
e
o
s
,
m
e
s
s
a
g
e
s
,
f
i
l
e
s
,
d
o
c
u
m
e
n
t
s
s
h
a
r
e
d
o
n
t
h
e
s
c
r
e
e
n
,
a
n
d
w
h
i
t
e
b
o
a
r
d
s
s
h
o
w
e
d
d
u
r
i
n
g
s
e
r
v
i
c
e
)
a
n
d
t
h
e
s
e
d
a
t
a
c
o
u
l
d
c
o
n
t
a
i
n
s
e
n
s
i
t
i
v
e
p
e
r
s
o
n
a
l
i
n
f
o
r
m
a
t
i
o
n
.
T
h
e
w
e
b
c
a
m
p
r
o
v
i
d
e
s
a
w
i
n
d
o
w
t
o
t
h
e
w
o
r
l
d
t
h
r
o
u
g
h
w
h
i
c
h
h
a
c
k
e
r
s
c
a
n
s
p
y
o
n
t
h
e
p
a
r
t
i
c
i
p
a
n
t
w
h
e
n
h
e
m
i
s
t
a
k
e
n
l
y
l
e
f
t
t
h
e
w
e
b
c
a
m
o
n
.
A
n
o
t
h
e
r
e
x
a
m
p
l
e
o
f
t
h
e
p
r
i
v
a
c
y
i
s
s
u
e
i
s
w
h
e
n
h
a
c
k
e
r
s
g
a
i
n
a
c
c
e
s
s
t
o
t
h
e
l
e
g
a
l
o
r
f
i
n
a
n
c
e
s
i
n
f
o
r
m
a
t
i
o
n
o
f
t
h
e
c
o
m
p
a
n
y
o
r
u
s
e
r
s
e
n
s
i
t
i
v
e
h
e
a
l
t
h
c
a
r
e
i
n
f
o
r
m
a
t
i
o
n
w
h
e
n
e
v
e
r
t
h
e
u
s
e
r
h
a
s
a
m
e
e
t
i
n
g
w
i
t
h
t
h
e
d
o
c
t
o
r
.
T
h
e
s
e
c
u
r
i
t
y
a
n
d
p
r
i
v
a
c
y
o
f
t
h
e
V
M
a
p
p
s
a
r
e
v
u
l
n
e
r
a
b
l
e
t
o
m
u
l
t
i
p
l
e
a
t
t
a
c
k
s
,
s
u
c
h
as
:
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c
En
g
&
Co
m
p
Sci
IS
S
N:
25
02
-
4752
E
-
le
arnin
g
vi
rt
ua
l
meeti
ng
applicati
ons: A c
omp
ar
ative
st
udy fr
om a cybe
rsecurit
y
…
(
Nad
e
r A
bd
el
K
ari
m
)
1125
Hij
ac
king
(H
J
K)
:
s
hared
by
public
s
ocial
m
edia
or
em
ail
s,
VM
ap
ps
ha
ve
public
or
ea
sil
y
gu
essa
ble
I
D
s
and
P
IN
s
.
W
it
hout
protect
io
n,
a
nyone
with
these
m
eet
ing
cre
den
ti
al
s
c
ould
join,
disru
pt
the
procee
di
ng
s
or acq
uire se
nsi
ti
ve
in
f
or
m
at
i
on.
Scree
n
sh
a
rin
g
(S
S)
:
Most
V
M
app
s
ha
ve
a
screen
s
har
i
ng
op
ti
on.
When
an
una
utho
rized
pa
rtic
ipa
nt
sh
are
s ina
ppr
opriat
e c
on
te
nt, t
his is Cy
berb
ul
ly
ing
.
Inform
at
ion
disclosure
an
d
a
sso
ci
at
ion
(ID
A)
:
W
it
h
in
form
ation
disclo
su
re
,
pa
rtic
ipant
inf
or
m
at
ion
is
detect
ed
an
d
extracte
d
un
i
nt
entionally
.
Wh
en
us
e
d
to
connect
with
ot
her
acco
unts
and
get
pr
i
vate
inf
or
m
at
ion
,
it
is
info
rm
at
ion
associat
ion
.
Wh
e
re
an
d
ho
w
any
recor
de
d
VMs
are
sto
red
a
nd
pr
otect
ed
is
i
m
po
rtant.
W
it
h
im
pr
oper ac
c
ess or lac
k of
e
ncr
y
p
ti
on, s
e
nsi
ti
ve
inf
or
m
at
i
on can
b
e
co
m
prom
ise
d.
Ma
lware
a
tt
acks
(M
A)
:
Ma
li
ci
ou
s
softwa
r
e
dev
el
op
e
d
by
the
intru
de
r
to
colle
ct
and
gain
acce
s
s
to
confide
ntial
infor
m
at
ion
.
P
h
i
s
h
i
n
g
a
t
t
a
c
k
s
(
P
A
)
:
B
a
s
e
d
o
n
s
o
c
i
a
l
e
n
g
i
n
e
e
r
i
n
g
d
e
v
e
l
o
p
e
d
t
o
m
i
m
i
c
g
e
n
u
i
n
e
s
i
t
e
s
,
t
h
e
s
e
o
n
l
i
n
e
a
t
t
a
c
k
s
s
t
e
a
l
t
h
e
v
i
c
t
i
m
'
s
s
e
n
s
i
t
i
v
e
d
a
t
a
b
y
h
i
d
i
n
g
a
s
a
l
e
g
i
t
i
m
a
t
e
t
h
i
r
d
-
p
a
r
t
y
w
e
b
s
i
t
e
.
U
R
L
s
a
r
e
s
e
n
t
t
o
t
a
r
g
e
t
e
d
u
s
e
r
s
t
h
r
o
u
g
h
e
m
a
i
l
,
s
p
a
m
m
e
s
s
a
g
e
s
,
o
r
s
o
c
i
a
l
n
e
t
w
o
r
k
i
n
g
w
e
b
s
i
t
e
s
(
e
.
g
.
,
F
a
c
e
b
o
o
k
)
t
o
r
e
t
r
i
e
v
e
p
a
s
s
w
o
r
d
s
,
b
a
n
k
d
e
t
a
i
l
s
a
n
d
c
r
e
d
i
t
c
a
r
d
n
u
m
b
e
r
s
.
S
i
n
c
e
t
h
e
C
O
V
I
D
-
1
9
o
u
t
b
r
e
a
k
,
h
a
c
k
e
r
s
h
a
v
e
b
e
e
n
i
n
c
r
e
a
s
i
n
g
l
y
i
m
p
e
r
s
o
n
a
t
i
n
g
v
i
d
e
o
c
o
n
f
e
r
e
n
c
i
n
g
a
p
p
l
i
c
a
t
i
o
n
s
,
i
n
c
l
u
d
i
n
g
Z
o
o
m
,
M
i
c
r
o
s
o
f
t
T
e
a
m
s
,
a
n
d
G
o
o
g
l
e
M
e
e
t
[
2
5
]
.
Face
r
eco
gnit
ion
a
tt
acks
(F
R
A)
:
I
de
ntifyi
ng
stra
ng
e
rs
f
rom
their
face,
by
onli
ne
or
offli
ne
vid
e
o
or
by
photog
raphs
w
idely
avail
able
on
s
ocial
net
w
ork
sit
es
(e.
g
F
aceboo
k),
us
e
d
to
ex
po
s
e
pe
rs
on
al
in
f
or
m
at
i
on
about
the
use
r.
Face
recog
niti
on
al
gorithm
s
can
ide
ntify
or
ver
ify
a
pe
rs
on
from
dig
it
al
photos
or
a
vide
o
so
urce.
D
a
t
a
b
r
e
a
c
h
:
S
o
m
e
V
M
a
p
p
s
p
r
o
v
i
d
e
r
e
c
o
r
d
i
n
g
a
n
d
c
l
o
u
d
s
t
o
r
a
g
e
a
b
i
l
i
t
i
e
s
f
o
r
t
h
e
i
r
u
s
e
r
s
.
T
h
e
s
e
r
e
c
o
r
d
i
n
g
s
c
o
u
l
d
c
o
n
t
a
i
n
s
e
n
s
i
t
i
v
e
a
n
d
p
r
i
v
a
t
e
i
n
f
o
r
m
a
t
i
o
n
s
u
c
h
a
s
u
s
e
r
’
s
f
u
l
l
n
a
m
e
s
,
p
h
o
n
e
n
u
m
b
e
r
s
,
a
n
d
a
d
d
r
e
s
s
e
s
.
Zo
om
bo
m
bin
g
(ZB):
T
his
at
ta
ck
de
note
s
unwa
nted
an
d
a
nnoyin
g
intr
ud
ing
par
ti
ci
pa
nt
s
w
ho
join
a
nd
interr
up
t
a
m
e
et
ing
with
a
gg
ressive
ta
lki
ng.
Alth
ough
the
te
r
m
is
ta
ken
from
the
Zo
om
app
nam
e,
t
he
ph
e
nom
eno
n
oc
cur
s
on
t
he
oth
er
VM
a
pps
as
well
.
T
he
si
gn
i
ficant
inc
re
as
e
in
th
e
use
of
t
he
Z
oom
a
pp
durin
g
the
CO
VID
-
19
pa
nde
m
ic
as
an
al
te
rn
at
ive
t
o
ph
y
sic
al
m
eet
ing
s
le
d
to
a
n
i
ncrea
se
in
int
rud
ers
try
ing
t
o
e
xp
l
oi
t t
he
flaws
of t
his a
pp
li
cat
ion
in this
way
[26]
.
3.
METHO
D
To
eval
uate
th
e
VM
ap
ps
sys
tem
fr
om
a
cyb
ersec
uri
ty
perspecti
ve,
dif
fere
nt
ty
pes
of
cy
ber
-
at
ta
cks
sh
oul
d
b
e
a
pp
l
ie
d.
This
resea
rch
fo
c
us
e
d
on
the
th
ree
po
pu
la
r
VM
ap
ps
us
ed
a
rou
nd
the
globe
cu
r
ren
tl
y:
Zo
om
,
MS
Tea
m
s,
and
G
oogle
Me
et
[12]
,
[27]
.
H
owever,
beca
us
e
these
app
s
a
re
cl
os
ed
s
our
ce
and
com
m
ercial
[28]
-
[
30]
,
it
is
no
t
possible
to
app
ly
these
at
t
acks
w
hile
us
i
ng
t
he
f
ull
featur
es
versi
ons
of
these
apps.
The
refo
r
e,
in
this
stud
y
,
the
li
te
ratur
e
and
re
ports
f
rom
reli
able
reso
ur
ces
(a
ccre
dited
sci
entifi
c
j
our
nal
or
a
n
a
rtic
le
from
a
sp
eci
a
li
z
ed
bo
dy)
relat
ed
to
t
he
sec
ur
it
y
of
the
se
ap
ps
are
do
wn
l
oaded,
rev
ie
wed,
a
nd
t
he
fr
ee
versi
on
of
these
a
pps
are
us
e
d
a
nd
exa
m
ined
f
or
any
vu
l
ner
a
bili
ti
es
that
m
a
y
le
ad
to
a
ny
ty
pe
of
cy
ber
-
at
ta
ck.
More
ov
er,
in
this
stu
dy
the
VM
apps
evaluati
on
pro
cess
f
oc
us
e
d
on
the
m
os
t
com
m
on
cy
ber
-
a
tt
acks
relat
ed
to
VM
apps,
w
hic
h
a
re
hi
j
acki
ng,
s
creen
s
ha
rin
g,
inf
or
m
at
ion
di
scl
os
ure,
a
nd
associat
ion,
m
al
war
e
at
ta
ck,
phis
hing att
ack,
f
ace
re
cogniti
on, dat
a breach
, a
nd z
oo
m
bo
m
bin
g [
10
]
.
4.
RESU
LT
S
Af
te
r
us
i
ng
t
he
VM
ap
ps
c
ho
sen
to
be
e
xa
m
ined
an
d
r
evi
ewin
g
the
li
te
r
at
ur
e
a
nd
re
ports
relat
ed
t
o
these
VM
a
pps
,
it
is
cl
ear
that
the
us
ers
of
th
ese
V
M
a
p
p
s
c
o
u
l
d
b
e
v
u
l
n
e
r
a
b
l
e
t
o
t
h
e
a
t
t
a
c
k
s
s
h
o
w
n
i
n
T
a
b
l
e
1.
Ex
planati
on
of each
of these
at
ta
cks
an
d
t
he
ex
te
nt
of thei
r im
pact
on
t
he
t
hr
ee
V
M a
pps
are as
f
ollow
:
H
J
K
:
U
s
e
r
s
i
n
Z
o
o
m
a
r
e
m
o
r
e
v
u
l
n
e
r
a
b
l
e
t
o
t
h
i
s
a
t
t
a
c
k
s
i
n
c
e
t
h
e
m
e
e
t
i
n
g
I
D
c
o
n
s
i
s
t
s
o
f
1
0
o
r
1
1
d
i
g
i
t
s
,
w
h
i
c
h
c
a
n
b
e
e
a
s
i
l
y
g
u
e
s
s
e
d
b
y
t
h
e
i
n
t
r
u
d
e
r
[
3
1
]
.
I
n
t
h
e
c
a
s
e
o
f
M
S
T
e
a
m
s
,
a
p
a
r
t
i
c
i
p
a
n
t
n
e
e
d
s
t
o
b
e
a
m
e
m
b
e
r
o
f
t
h
e
c
l
a
s
s
a
d
m
i
n
i
s
t
e
r
e
d
b
y
t
h
e
c
l
a
s
s
o
w
n
e
r
(
a
d
m
i
n
)
a
n
d
m
u
s
t
h
a
v
e
a
n
"
o
u
t
l
o
o
k
"
e
m
a
i
l
r
e
l
a
t
e
d
t
o
t
h
e
s
c
h
o
o
l
o
r
u
n
i
v
e
r
s
i
t
y
.
A
s
f
o
r
G
o
o
g
l
e
M
e
e
t
,
t
h
e
m
e
e
t
i
n
g
I
D
c
o
n
s
i
s
t
s
o
f
1
0
a
l
p
h
a
b
e
t
c
h
a
r
a
c
t
e
r
s
,
i
n
a
d
d
i
t
i
o
n
t
o
t
h
e
t
w
o
f
e
a
t
u
r
e
s
w
h
i
c
h
a
r
e
A
P
P
(
A
d
v
a
n
c
e
P
r
o
t
e
c
t
i
o
n
P
r
o
g
r
a
m
)
a
n
d
2
S
V
(
2
-
S
t
e
p
V
e
r
i
f
i
c
a
t
i
o
n
)
[
3
2
]
.
Table
1.
VM a
pp
s
vs
po
s
sible
att
acks
Ap
p
Na
m
e/
Attack
HJK
SS
IDA
MA
PA
FR
DB
ZB
Zoo
m
√
√
√
√
√
√
√
√
MS
tea
m
s
√
√
√
√
√
Go
o
g
le M
eet
√
√
√
√
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
2
4
, N
o.
2
,
N
ove
m
ber
20
21
:
11
2
1
-
112
9
1126
SS:
This
feat
ure
is
pro
vid
e
d
by
al
l
three
ap
ps
,
s
o
the
us
er
s
in
each
m
eeting
s
hould
e
xp
ect
to
face
this
at
ta
ck
f
ro
m
an
y
intrude
r
who
can
gai
n
th
e
a
cce
ss
to
these
m
eet
ing
s.
In
Z
oo
m
,
the
m
eet
i
ng
co
ordi
nato
r
can
rest
rict
m
e
m
ber
s'
capab
il
i
ty
to
sh
are
thei
r
scree
n
[
33]
.
I
n
G
oogle
Me
et
,
preve
ntin
g
ca
ll
par
ti
ci
pan
ts
from
sh
aring
t
heir
scre
en
is
c
urren
tl
y
only
avail
abl
e
f
or
Goog
le
Workspac
e
for
Ed
ucati
on
us
e
rs
[
34]
.
I
n
MS
Team
s,
the
adm
in
can
con
fi
gure
scree
n
sh
ari
ng
a
nd
le
t
us
ers
s
har
e
a
n
entire
scree
n.
The
adm
in
al
so
enab
le
s
us
ers
t
o
giv
e
or
re
qu
est
con
tr
ol.
More
over,
the
a
dm
in
can
con
f
igure
w
hether
anonym
o
us
or
exter
nal u
se
rs r
equ
e
st co
ntr
ol
of the s
ha
red s
creen
[
35
]
.
IDA:
H
os
ts
ha
ve
the
abili
ty
t
o
colle
ct
us
er
inf
or
m
at
ion
from
the
m
eet
in
g
an
d
sh
a
re
it
.
The
poli
cy
of
Zo
om'
s
pr
ivac
y
is
si
m
il
ar
to
oth
e
r
VM
ap
ps.
It
cl
ai
m
s
t
he
rig
ht
to
gathe
r,
store
us
e
rs
’
da
ta
,
an
d
s
har
e
it
su
c
h
as
in
ad
ve
rtise
rs
[
36]
.
Also
i
n
MS
T
ea
m
s,
any
m
e
m
ber
of
the
T
ea
m
’s
m
ee
ti
ng
can
a
uto
m
at
icall
y
acce
ss
al
l
m
ee
ti
ng
file
s
[
20
]
.
Ad
m
in
in
Team
s
can
us
e
th
e
Gu
est
acce
ss
set
ti
ng
s
in
the
Team
s
ad
m
i
n
center
t
o
c
onfigure
t
he
le
vel
of
a
ccess
gr
a
nt
ed
to
guest
us
e
rs.
For
m
axi
m
um
secur
it
y,
adm
in
can
le
av
e
gu
e
st
acce
ss
disabled
by
de
fa
ult.
The
us
e
r
can
create
a
p
rivate
m
eet
ing
with
a
m
axi
m
um
of
30
cha
nnel
s
[37]
in
a
Team
to
create
si
ng
l
e
per
m
issi
on
f
or
a
sp
eci
fic
m
eet
ing
(
f
or
i
ns
ta
nce
“M
ana
ge
m
ent”),
but
he
cannot
in
vite
“gu
e
st
us
ers”
t
o
the
sel
ect
ed
m
eet
ing
s
[20]
.
Moreove
r,
by
def
a
ult,
any
cl
ass
m
e
m
ber
c
an
sta
rt
recordi
ng
without
any
pe
rm
issi
on
s.
Aft
er
the
sessio
n
has
fi
nish
e
d,
the
vid
e
o
s
will
be
sh
a
re
d
an
d
can
be
do
wn
l
oa
d
from
any
me
m
ber
within
t
he
cl
ass
on
the
cl
ass
tim
el
ine
for
20
days.
Re
la
te
d
to
Goog
l
e
Me
et
and
base
d
on
G
oogle,
e
ach
us
e
r
ow
ns
their
data.
Goo
gle
sta
te
d
on
it
s
offici
al
web
s
it
e
that
they
do
no
t
us
e
d
t
he
c
ust
om
er
'
s d
at
a
to tar
get them
w
it
h
a
ds
a
nd
does
not sel
l t
he
ir d
at
a t
o
a t
hir
d party
[
34]
.
M
A
:
C
l
i
e
n
t
Z
o
o
m
a
p
p
s
a
l
l
o
w
a
t
t
a
c
k
e
r
s
t
o
e
x
p
l
o
i
t
t
h
e
d
e
v
e
l
o
p
e
d
a
n
i
m
a
t
e
d
G
I
F
p
i
c
t
u
r
e
s
l
o
c
a
t
e
d
i
n
a
Z
o
o
m
m
e
e
t
i
n
g
c
h
a
t
t
o
h
a
c
k
t
h
e
c
l
i
e
n
t
a
p
p
o
n
o
t
h
e
r
m
o
b
i
l
e
p
h
o
n
e
s
[
3
8
]
.
W
h
i
l
e
i
n
M
S
T
e
a
m
s
,
M
i
c
r
o
s
o
f
t
w
a
r
n
s
t
h
e
c
u
s
t
o
m
e
r
s
a
b
o
u
t
t
h
e
“
F
a
k
e
U
p
d
a
t
e
s
”
c
a
m
p
a
i
g
n
s
i
n
a
p
r
i
v
a
t
e
s
e
c
u
r
i
t
y
a
d
v
i
s
o
r
y
b
a
s
e
d
o
n
a
r
e
p
o
r
t
i
n
B
l
e
e
p
i
n
g
C
o
m
p
u
t
e
r
[
3
9
]
.
D
i
f
f
e
r
e
n
t
t
y
p
e
s
o
f
c
o
m
p
a
n
i
e
s
a
r
e
t
a
r
g
e
t
e
d
b
y
t
h
e
s
e
c
a
m
p
a
i
g
n
s
.
T
h
e
r
e
c
e
n
t
c
a
m
p
a
i
g
n
s
t
a
r
g
e
t
t
h
e
K
-
1
2
e
d
u
c
a
t
i
o
n
s
e
c
t
o
r
t
h
a
t
i
s
n
o
w
d
e
p
e
n
d
e
n
t
o
n
T
e
a
m
s
d
u
e
t
o
C
O
V
I
D
-
1
9
l
i
m
i
t
a
t
i
o
n
s
.
C
o
b
a
l
t
S
t
r
i
k
e
i
s
a
n
a
t
t
a
c
k
t
o
o
l
t
h
a
t
h
a
c
k
e
r
u
s
e
s
t
o
s
p
r
e
a
d
m
a
l
i
c
i
o
u
s
p
r
o
g
r
a
m
s
(
e
.
g
.
R
a
n
s
o
m
w
a
r
e
m
a
l
w
a
r
e
)
[40]
.
W
i
t
h
G
o
o
g
l
e
M
e
e
t
,
r
e
s
e
a
r
c
h
e
r
s
f
r
o
m
C
h
e
c
k
P
o
i
n
t
S
o
f
t
w
a
r
e
T
e
c
h
n
o
l
o
g
i
e
s
[
4
1
]
h
a
v
e
f
o
u
n
d
f
a
k
e
G
o
o
g
l
e
M
e
e
t
d
o
m
a
i
n
s
t
h
a
t
s
e
n
t
p
e
o
p
l
e
t
o
m
a
l
i
c
i
o
u
s
w
e
b
s
i
t
e
s
w
h
i
c
h
l
o
o
k
l
i
k
e
a
l
e
g
i
t
i
m
a
t
e
w
e
b
s
i
t
e
t
o
i
n
s
t
a
l
l
m
a
l
w
a
r
e
o
n
t
h
e
u
s
e
r
’
s
d
e
v
i
c
e
s
.
H
o
w
e
v
e
r
,
t
h
e
n
u
m
b
e
r
o
f
t
h
e
s
e
d
o
m
a
i
n
s
a
r
e
i
n
c
o
m
p
a
r
a
b
l
e
w
i
t
h
t
h
e
n
u
m
b
e
r
o
f
d
o
m
a
i
n
s
t
h
a
t
m
a
d
e
f
o
r
Z
o
o
m
s
i
n
c
e
J
a
n
u
a
r
y
t
o
M
a
y
2
0
2
0
(
6
,
5
7
6
Z
o
o
m
-
r
e
l
a
t
e
d
d
o
m
a
i
n
s
h
a
v
e
b
e
e
n
r
e
g
i
s
t
e
r
e
d
g
l
o
b
a
l
l
y
)
.
W
i
t
h
r
e
s
p
e
c
t
t
o
m
e
e
t
,
G
o
o
g
l
e
m
a
d
e
a
d
v
a
n
c
e
d
p
h
i
s
h
i
n
g
a
n
d
m
a
l
w
a
r
e
p
r
o
t
e
c
t
i
o
n
a
g
a
i
n
s
t
p
h
i
s
h
i
n
g
a
n
d
h
a
r
m
f
u
l
s
o
f
t
w
a
r
e
(
m
a
l
w
a
r
e
)
a
n
d
u
s
e
r
s
c
a
n
u
s
e
a
n
y
m
o
d
e
r
n
w
e
b
b
r
o
w
s
e
r
a
n
d
n
o
d
o
w
n
l
o
a
d
i
s
r
e
q
u
i
r
e
d
[
4
2
]
.
O
r
g
a
n
i
z
a
t
i
o
n
s
c
a
n
s
t
o
p
a
n
d
r
e
s
t
r
i
c
t
a
t
t
a
c
k
s
a
n
d
b
a
n
i
s
h
h
a
c
k
e
r
a
t
t
a
c
k
s
b
y
b
l
o
c
k
i
n
g
e
x
e
c
u
t
a
b
l
e
f
i
l
e
s
t
h
a
t
d
o
n
o
t
m
e
e
t
s
p
e
c
i
f
i
c
c
r
i
t
e
r
i
a
o
r
b
y
b
l
o
c
k
i
n
g
J
a
v
a
S
c
r
i
p
t
a
n
d
V
B
S
c
r
i
p
t
c
o
d
e
f
r
o
m
d
o
w
n
l
o
a
d
i
n
g
e
x
e
c
u
t
a
b
l
e
c
o
n
t
e
n
t
[
3
9
]
.
P
A
:
T
h
e
A
n
t
i
-
P
h
i
s
h
i
n
g
W
o
r
k
i
n
g
G
r
o
u
p
(
A
P
W
G
)
r
e
c
e
i
v
e
d
o
n
l
y
f
e
w
r
e
p
o
r
t
s
o
f
p
h
i
s
h
i
n
g
a
t
t
a
c
k
s
a
g
a
i
n
s
t
t
h
e
Z
o
o
m
a
p
p
i
n
M
a
r
c
h
2
0
2
0
w
h
i
l
e
,
i
n
A
p
r
i
l
,
t
h
e
n
u
m
b
e
r
o
f
r
e
p
o
r
t
s
r
e
a
c
h
e
d
a
r
o
u
n
d
o
n
e
t
h
o
u
s
a
n
d
[
2
4
]
,
[
4
3
]
.
The
victi
m
s
re
cei
ve
em
a
il
s
sa
yi
ng
there
is
a
Zo
om
m
eeting
sta
rting
s
oon.
The
em
ail
al
so
prov
i
des
a
li
nk
to
the
ph
is
hing
pa
ge
that
im
per
so
nates
the
Zo
om
log
in
pa
ge
[
44
]
.
The
n
the
phishin
g
sit
e
asks
fo
r
victim
s
'
zoo
m
cred
e
ntial
s
to
l
og
in.
Re
searc
her
s
f
ro
m
Abn
or
m
al
Secur
it
y
[45]
,
sec
uri
ty
warn
us
er
s
of
a
ph
is
hing
cam
paign
t
hat
m
ay
be
a
n
a
uto
m
at
e
d
m
essage
se
nd
to
MS
Team
s
ap
p.
This
phi
sh
in
g
cam
paig
n
was
se
nt
to
be
tween
15,00
0
and
50,
000
Office
365
us
e
rs
[46]
.
Re
searc
he
rs
in
[46]
m
e
ntion
e
d:
“Si
nc
e
MS
Team
s
is
an
im
m
ediat
e
-
m
essaging
se
r
vice,
recei
ver
s
of
this
noti
fic
at
ion
co
uld
be
m
or
e
su
scepti
bl
e
to
cl
ic
k
on
it
so
that
t
hey
can
rep
ly
f
ast
to
w
hateve
r
m
essage
they
belie
ve
they
co
uld
ha
ve
m
issed
bas
e
d
on
t
he no
ti
ficat
ion
,”
. T
he ph
is
hing em
ai
l ann
ounces “
The
re
is new
a
ct
ivit
y i
n
Team
s,” in
order t
o
a
pp
ea
r
li
ke
an
aut
om
a
te
d
em
ai
l
no
ti
ficat
ion
f
r
om
M
S
Team
s.
An
e
xam
ple
of
t
he
t
ype
of
em
ai
l
a
recipient
m
igh
t
receive
is
a
no
ti
ficat
ion
that
their
colle
a
gu
es
are
try
ing
to
r
each
an
d
wa
r
n
them
abo
ut
m
issed
chats.
A
chat co
uld
be
s
how
n
te
ll
ing
th
e recipient to s
end
s
om
et
hin
g by a certai
n
da
te
. D
at
a scie
ntist
at Ab
no
rm
al
Secu
rity
,
Erin
Lu
der
t,
sai
d
t
hat
intr
ud
e
rs
are
us
in
g
m
ore
of
a
“
spray
”
strat
egy,
as
the
em
plo
ye
e
ref
e
ren
ce
d
in
t
he
chats
do
es
no
t
seem
to
be
an
em
plo
ye
e
of
the
firm
tha
t
received
the
at
ta
ck
[45]
.
T
o
respo
nd,
the
vi
ct
i
m
is
asked
by
e
m
a
il
to
cl
ic
k
on
the
“R
epl
y
in
Tea
m
s”
b
utton
a
nd
this
will
red
irect
th
e
victim
to
a
ph
ishin
g
pa
ge
t
ha
t
i
m
per
so
nates
the
MS
Team
log
in
pa
ge.
T
he
phis
hing
pa
ge
as
ks
the
M
S
Team
m
e
m
ber
s
to
enter
their
log
in
in
form
at
i
on,
em
a
il
,
and
pass
word.
The
ph
is
hing
cam
p
ai
gn
ta
rg
et
s
up
to
50,
000
O
ff
i
ce
365
us
e
rs
t
o
no
ti
fy
them
of
a
“m
issed
chat”
f
ro
m
the
MS
Team
app
[25]
,
[45]
-
[47
]
.
Re
gardin
g
G
oo
gle Mee
t, fr
a
uds in
em
ai
ls
i
m
per
s
onat
ing
s
om
e p
ub
li
c orga
nizat
ion
s li
ke
t
he
w
or
l
d
healt
h
orga
nizat
ion
(
WHO)
ha
ve
be
en
ob
se
r
ved
by
G
oogle
a
nd
f
ound
i
n
April
2020
m
or
e
than
18
m
il
l
i
on
m
al
war
e an
d p
hish
i
ng
em
ai
ls
associat
ed wit
h C
OVID
-
19
i
n on
e
wee
k.
The pr
oble
m
b
ecom
es cle
ar s
ince
the
WH
O
has
a
web
pa
ge
devoted
t
o
inf
or
m
at
ion
abou
t
COVID
-
19
hack
e
rs
a
nd
s
ca
m
m
ers
[48]
.
Howe
ver,
Goo
gle
prov
i
des
it
s
ap
ps
with
fea
tures
that
pro
vid
e
st
ron
g
prote
ct
ion
a
gainst
phishi
ng,
wh
ic
h
is
sp
eci
fical
ly
desig
ne
d
f
or
the
highest
ris
k
acco
un
ts,
an
d
they
di
d
not
no
ti
ce
a
ny
su
c
cessf
ul
phishi
ng
at
tem
pts f
or th
e u
se
rs who
p
a
rtic
ipate
in thei
r
a
pp
s
, e
ven if
they
are rep
eat
edly
targ
et
e
d
[
34
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c
En
g
&
Co
m
p
Sci
IS
S
N:
25
02
-
4752
E
-
le
arnin
g
vi
rt
ua
l
meeti
ng
applicati
ons: A c
omp
ar
ative
st
udy fr
om a cybe
rsecurit
y
…
(
Nad
e
r A
bd
el
K
ari
m
)
1127
FR:
All
the
a
pps
unde
r
this
s
tud
y
al
lo
w
ho
s
ts
to
rec
ord
t
he
m
ee
ti
ng
an
d
store
t
hem
wh
et
he
r,
in
their
per
s
onal
co
m
pu
te
r or cl
oud.
These
rec
ordin
gs
a
re
vu
l
ner
a
bl
e to s
uch att
ack.
D
B
:
W
a
g
e
n
s
e
i
l
[
3
8
]
m
e
n
t
i
o
n
e
d
t
h
a
t
Z
o
o
m
d
e
c
l
a
r
e
s
i
t
s
m
e
e
t
i
n
g
s
u
s
e
"
e
n
d
-
to
-
e
n
d
e
n
c
r
y
p
t
i
o
n
"
i
f
e
a
c
h
p
a
r
t
y
c
a
l
l
s
i
n
f
r
o
m
a
P
C
o
r
a
Z
o
o
m
m
o
b
i
l
e
a
p
p
.
B
u
t
u
n
d
e
r
p
r
e
s
s
u
r
e
f
r
o
m
t
h
e
I
n
t
e
r
c
e
p
t
,
t
h
e
Z
o
o
m
c
o
m
p
a
n
y
s
p
o
k
e
s
m
a
n
d
i
s
c
l
o
s
e
d
t
h
a
t
Z
o
o
m
'
s
d
e
s
c
r
i
p
t
i
o
n
s
o
f
t
h
e
t
e
a
m
"
e
n
d
-
to
-
e
n
d
"
a
n
d
"
e
n
d
p
o
i
n
t
"
a
r
e
d
i
f
f
e
r
e
n
t
f
r
o
m
o
t
h
e
r
p
a
r
t
i
e
s
.
"
O
n
c
e
u
s
i
n
g
p
h
r
a
s
e
'
E
n
d
t
o
E
n
d
,
"
a
Z
o
o
m
r
e
p
r
e
s
e
n
t
a
t
i
v
e
e
x
p
r
e
s
s
e
d
t
o
t
h
e
I
n
t
e
r
c
e
p
t
,
"
i
t
i
s
a
b
o
u
t
t
h
e
c
o
n
n
e
c
t
i
o
n
b
e
i
n
g
e
n
c
r
y
p
t
e
d
f
r
o
m
Z
o
o
m
e
n
d
p
o
i
n
t
t
o
Z
o
o
m
e
n
d
p
o
i
n
t
.
"
I
t
s
o
u
n
d
s
g
r
e
a
t
,
n
e
v
e
r
t
h
e
l
e
s
s
,
t
h
e
Z
o
o
m
r
e
p
r
e
s
e
n
t
a
t
i
v
e
e
x
p
l
a
i
n
e
d
t
h
a
t
h
e
c
o
u
n
t
e
d
a
Z
o
o
m
s
e
r
v
e
r
a
s
a
n
e
n
d
p
o
i
n
t
,
a
n
d
t
h
i
s
c
o
n
s
i
d
e
r
e
d
p
h
o
n
e
y
e
n
d
-
to
-
e
n
d
e
n
c
r
y
p
t
i
o
n
.
M
o
r
e
o
v
e
r
,
b
a
s
e
d
o
n
[
4
]
,
u
s
e
r
’
s
i
n
f
o
r
m
a
t
i
o
n
w
a
s
s
t
i
l
l
f
o
u
n
d
w
h
i
c
h
i
n
c
l
u
d
i
n
g
a
p
l
a
i
n
t
e
x
t
o
f
u
s
e
r
i
n
f
o
r
m
a
t
i
o
n
,
c
h
a
t
m
e
s
s
a
g
e
s
,
p
r
o
f
i
l
e
p
i
c
t
u
r
e
s
,
f
i
l
e
s
e
x
c
h
a
n
g
e
d
,
a
n
d
u
s
e
r
’
s
c
o
n
t
a
c
t
i
n
f
o
r
m
a
t
i
o
n
.
F
u
r
t
h
e
r
m
o
r
e
,
b
i
t
s
o
f
t
h
i
s
i
n
f
o
r
m
a
t
i
o
n
c
a
n
s
t
i
l
l
b
e
f
o
u
n
d
a
n
d
s
a
v
e
d
e
v
e
n
w
h
i
l
e
a
u
s
e
r
d
e
c
i
d
e
d
t
o
d
e
l
e
t
e
a
c
o
n
t
a
c
t
f
r
o
m
t
h
e
i
r
a
p
p
[
1
1
]
,
[
3
8
]
.
I
n
M
S
T
e
a
m
s
,
t
h
e
d
a
t
a
(
i
.
e
.
,
v
i
d
e
o
f
i
l
e
s
,
a
u
d
i
o
f
i
l
e
s
,
a
n
d
i
n
f
o
r
m
a
t
i
o
n
)
i
s
e
n
c
r
y
p
t
e
d
o
n
t
r
a
n
s
i
t
i
o
n
b
e
t
w
e
e
n
d
i
f
f
e
r
e
n
t
d
e
v
i
c
e
s
,
u
s
e
r
s
,
o
r
d
a
t
a
c
e
n
t
e
r
s
c
o
m
p
a
r
e
s
w
i
t
h
s
t
a
n
d
a
r
d
a
p
p
r
o
a
c
h
e
s
.
M
S
t
e
a
m
e
n
c
r
y
p
t
s
u
s
e
r
d
a
t
a
,
b
u
t
i
t
r
e
m
a
i
n
s
i
n
p
o
s
s
e
s
s
i
o
n
o
f
t
h
e
e
n
c
r
y
p
t
i
o
n
k
e
y
s
t
o
u
s
e
r
d
a
t
a
.
T
h
i
s
e
n
a
b
l
e
s
M
i
c
r
o
s
o
f
t
t
o
a
c
c
e
s
s
a
l
l
d
a
t
a
s
t
o
r
e
d
a
n
d
u
s
e
d
i
n
M
i
c
r
o
s
o
f
t
T
e
a
m
s
i
n
p
l
a
i
n
t
e
x
t
[
4
9
]
.
G
o
o
g
l
e
m
e
e
t
s
a
v
e
s
r
e
c
o
r
d
i
n
g
s
i
n
c
l
o
u
d
s
t
o
r
a
g
e
,
s
o
i
n
t
h
i
s
c
a
s
e
,
r
e
c
o
r
d
i
n
g
s
c
o
u
l
d
b
e
v
u
l
n
e
r
a
b
l
e
t
o
t
h
i
s
t
y
p
e
o
f
a
t
t
a
c
k
.
ZB:
New
resea
rch
c
onduct
ed
at
the
Un
i
ver
si
ty
of
Bost
on
a
nd
U
niv
er
sit
y
of
Bi
ng
ham
ton
[12]
sta
te
d
tha
t
effor
ts
to
sto
p
"Zo
om
bo
m
bin
g,
" f
or
ex
am
pl
e
enterin
g
pass
words
to g
et
ac
cess
or
m
aking
wait
ing
r
oom
s
wh
e
re
a
pa
rtic
ipant
nee
ds
a
pp
roval
f
r
om
the
m
eet
ing
co
ordi
nato
r
to
acce
ss
the
m
eet
ing
,
oft
en
w
ou
l
d
no
t
wor
k.
T
hat
is
because
m
any
at
ta
cks
are
e
xe
cuted
by
inter
na
l
and
a
uthoriz
ed
use
rs
(
e.
g.
,
stud
e
nts
in
th
e
cl
ass).
T
he
res
earch
res
ults
s
how
t
hat
the
va
st
m
ajo
rity
of
cal
ls
for
Z
oom
bo
m
bin
g
a
r
e
not
create
d
by
at
ta
cker
s
stum
bling
upon
m
eet
ing
in
vitat
ions
or
brute
-
f
or
ci
ng
t
heir
m
eet
ing
I
D,
but
rathe
r
by
le
giti
m
at
e
par
ti
ci
pa
nts
w
ho
hav
e
le
gal
acce
ss
to
thes
e
m
eet
ing
s,
especial
ly
stud
ents
in
high
sc
hool
an
d
colle
ge
cl
asses.
Sam
e
researc
hers
m
e
ntion
e
d
that
G
oogle
Me
et
is
al
so
vulne
rab
l
e
to
“Zo
om
B
om
bin
g”
at
ta
ck
al
tho
u
gh
t
he
re
su
lt
s
s
howe
d
t
hat
MS
te
am
is
le
ss
vu
l
ner
a
ble
to
“
Z
oom
bom
bin
g”
at
ta
ck
since
the
na
tur
e
of
MS
te
am
s
m
akes
it
le
ss
vu
l
ner
a
ble
to
this
kind
of
at
ta
cks
an
d
us
e
rs
are
al
read
y
m
e
m
ber
s
within
cl
asses esta
blis
hed b
y t
he
a
dmi
n
[
12]
.
5.
DISCU
SSI
ON
Fr
om
the
res
ul
ts
show
n
i
n
the
pr
e
vi
ou
s
sect
ion,
it
can
be
c
on
cl
ud
e
d
t
hat
al
l
three
VM
a
pp
s
sti
ll
hav
e
secur
it
y
issues
from
a
cy
ber
secur
it
y
pe
rsp
e
ct
ive.
We
noti
ce
that
there
is
a
discre
pan
cy
i
n
m
eet
ing
the
se
cur
it
y
requirem
ents bet
ween
th
e thr
e
e V
M ap
ps
as
s
how
n
in Ta
ble
1
as
well
. A
cc
ordin
g
to Z
oo
m
, w
e can
no
ti
ce that
this
app
li
cat
io
n
is
vulner
able
to
al
l
po
ssible
at
ta
cks
m
entio
ned
i
n
Table
1
includi
ng
hij
ac
king,
sc
reen
s
ha
rin
g,
inf
or
m
at
ion
di
scl
os
er
an
d
as
so
ci
at
ion,
m
alw
are
,
ph
is
hing
,
face
rec
ognit
ion
,
dat
a
breac
h,
a
nd
z
oo
m
bom
bin
g
at
ta
cks.
As
f
or
the
MS
Tea
m
s,
the
sit
uation
see
m
s
bette
r,
bu
t
this
ap
p
is
sti
ll
su
bj
ect
to
so
m
e
attacks
su
ch
a
s
screen
s
har
i
ng,
inform
at
ion
disclose
r
an
d
associat
ion,
m
al
war
e,
ph
is
hin
g,
an
d
face
recog
niti
on
at
ta
cks
.
Accor
ding
to
G
oo
gle
Me
et
,
i
t
ap
pear
s
that
t
his
a
pp
li
cat
io
n
perform
s
well
in
te
rm
s
of
sec
uri
ty
;
howev
e
r, i
t
sti
l
l
faces
so
m
e
kinds
of
at
ta
cks
li
ke
scree
n
s
har
i
ng,
face
recog
niti
on
,
a
nd
Zo
om
bo
m
bin
g.
A
s
a
su
m
and
ba
sed
on
our
res
ults,
it
can
be
c
on
cl
uded
t
hat
Goo
gl
e
Me
et
i
s
a
m
or
e
app
r
opri
at
e
VM
app
i
n
te
rm
s
of
secur
it
y,
fo
ll
owe
d by th
e MS Team
s,
and the
n finall
y com
es the Zoo
m
ap
p.
At
the
sam
e
tim
e,
it
is
wo
rt
h
no
ti
ng
t
hat
sec
ur
it
y
is
one o
f
m
any
factor
s
that
sho
uld
b
e
c
heck
e
d
w
he
n
choosi
ng
t
he
s
uitable
VM
a
pp
to
m
eet
an
in
sti
tuti
on
’s
re
quirem
ents
as
sh
own
i
n
Sect
io
n
2.2.
The
re
is
oft
en
a
trade
-
off
betw
een
sec
ur
it
y
and
us
a
bili
ty
/perfor
m
ance
[50
]
,
[51]
.
This
c
ou
l
d
le
ad
s
ome
insti
tutes
to
pic
k
us
a
bili
ty
/perf
orm
ance
to
please
their
custom
ers
ex
plainin
g
the
reason
w
hy
Zoo
m
is
the
wo
rl
d'
s
first
cho
i
ce
of
VM
a
pp
s
[
14]
,
[
16]
.
I
n
a
dd
it
ion
to
t
he
a
bove
m
entione
d
discussi
on,
an
d
to
ke
ep
the
pri
vacy
a
nd
the
confide
ntial
inform
ation
sec
ur
e
wh
il
e
usi
ng
the
VM
ap
ps,
it
is
reco
m
m
end
ed
t
o
sha
re
as
li
tt
le
per
sonal
inf
or
m
at
ion
as
possible,
us
e
a
sin
gle
a
pp
and
an
em
ai
l
that
is
not
us
e
d
for
a
nythin
g
el
se
s
uch
ba
nkin
g,
healt
hcar
e
,
an
d
so
ci
al
m
edia
accounts,
tu
r
n
off
the
cam
era
an
d
m
ic
ropho
ne
w
hen
e
ve
r
they
are
no
t
us
ing
them
,
us
e
the
blurre
d
bac
kgr
ound
in
or
der
no
t
to
disclose
the
perso
nal
de
ta
il
s
that
can
be
seen
f
r
om
anyt
hing
beh
i
nd or
besi
de
yo
u [
37
]
.
6.
CONCL
US
I
O
N
The
m
ajo
rity
of
ed
ucati
onal
i
ns
ti
tuti
on
s
an
d
unive
rsiti
es
ha
ve
been
f
or
ce
d
to
ad
opt
the
VM
ap
ps
t
o
con
ti
nue
le
ar
ni
ng
a
nd
co
ntact
ing
stu
de
nts
an
d
sta
ff
duri
ng
t
he
CO
VID
-
19
pandem
ic
.
Man
y
crit
eria
sho
uld
be
consi
der
e
d
to
sel
ect
an
appr
opriat
e
VM
ap
p,
li
ke
cost
,
com
patibil
ity,
pu
r
pose,
inte
gr
a
ti
on
,
a
nd
nu
m
ber
of
par
ti
ci
pa
nts,
usa
bili
ty
,
and
s
ecur
it
y.
Th
ree
VM
ap
ps
(
i.e
.,
Zo
om
,
MS
Team
s,
and
G
oogle
Me
et
)
w
ere
the
pr
e
ferred
c
hoic
e
fo
r
m
os
t
educat
ion
al
insti
tute
s.
Howe
ver
,
m
al
ic
iou
s
at
ta
c
ker
s
hav
e
c
ons
idere
d
this
sit
uatio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
2
4
, N
o.
2
,
N
ove
m
ber
20
21
:
11
2
1
-
112
9
1128
as
an
oppo
rtu
nity
to
at
ta
ck
the
on
li
ne
V
M
app
s
us
in
g
their
featu
res
su
c
h
as
m
ee
tin
g
ID,
scree
n
sh
ari
ng,
per
s
onal
in
for
m
at
ion
rec
ord
ing
s
,
a
nd
em
a
il
s.
This
stu
dy
discu
ssed
t
he
possible
at
ta
cks
on
the
above
-
m
entioned
a
pps,
s
uch
as,
hi
ja
ckin
g,
scree
n
sh
a
rin
g,
i
nfo
r
m
at
ion
disclo
s
er,
m
al
war
e,
phishi
ng,
data
breac
h,
and
zo
om
bo
m
bing.
T
he
res
ul
ts
rev
eal
that
Goo
gle
Me
et
can
be
a
dopte
d
sec
ur
el
y
in
the
e
du
cat
io
nal
sect
or,
then
MS
Tea
m
s
and
,
la
stl
y
is
Zo
om
reg
ard
le
ss
of
ot
her
facto
rs
s
uch
as
the
ease
of
us
e
a
nd
num
ber
of
par
ti
ci
pa
nts
an
d
m
eet
ing
pe
riod.
Be
sides
,
th
e
secu
rity
featur
es
of
the
se
a
pp
s
that
s
houl
d
be
pro
per
ly
to
set
ar
e
highli
gh
te
d.
S
om
e
reco
m
m
e
nd
at
io
ns
w
hen
us
in
g
t
he
onl
ine
VM
a
pps
hav
e
bee
n
inc
l
ud
e
d
as
well
.
Fu
tu
re
work
is
require
d
to
re
-
ev
al
uat
e
the
discusse
d
VM
ap
ps
in
th
is
stud
y
at
the
end
of
2021,
a
s
well
as,
to
ev
al
uate
the o
t
her avail
able VM
apps t
hat could
b
e
picked b
y t
he
e
ducat
ion i
ns
ti
tut
ion
s
as e
-
le
arn
i
ng m
ediu
m
s.
REFERE
NCE
S
[1]
C.
Li
and
F.
L
alani
,
“
Th
e
COV
ID
-
19
pande
m
ic
has
cha
nged
edu
ca
t
ion
fore
v
er.
Thi
s
is
how
,”
W
orld
Ec
oconomi
c
Forum
Covi
d
Ac
ti
on
Pl
a
tf
orm
,
2020.
[Online
]
.
Avail
ab
le
:
ht
tps:/
/www
.
weforum
.
org/a
g
enda
/2
02
0/04/
cor
on
a
virus
-
educ
a
ti
on
-
glob
al
-
covi
d19
-
onl
ine
-
digi
tal
-
l
ea
rning
/
[2]
N.
A.
Kari
m
a
nd
Z.
Shukur,
“
Revi
ew
of
Us
er
Authent
icati
on
Methods
in
Online
Exa
m
ination
,
”
Asian
J
.
Inf.
Technol
.
,
vo
l. 14
,
no
.
5
,
pp
.
166
-
175,
2015
.
[3]
P.
Chakra
bort
y
,
P.
Mitt
al,
M.
S.
Gupta,
S
.
Yada
v
,
and
A.
Arora
,
“
Opinion
of
student
s
on
onli
ne
educ
a
ti
on
during
the
COV
ID
-
19
p
ande
m
ic
,
”
Hum
.
Be
hav
.
Eme
rg.
T
ec
hnol
.
,
vol
.
3
,
n
o.
3
,
pp
.
357
-
36
5
,
2020
,
doi
:
10
.
1002/hbe
2.
240
.
[4]
C.
J.
E
ck,
K.
Dale
L
a
y
fi
el
d,
C.
A.
Diben
edetto,
and
J.
Gore
,
“
School
-
Based
Agric
ult
ur
al
E
duca
t
ion
Teac
h
e
rs
Com
pet
enc
e
of
S
y
nchr
onous
On
li
ne
Instruc
t
ion
Tool
s
During
th
e
COV
ID
-
19
Pandemic,
”
Journa
l
of
Agric
u
lt
ural
Educ
ati
on
,
vo
l.
62,
no
.
2
,
pp
.
13
7
-
147
,
202
1
,
doi
:
10.
5032
/j
a
e.
20
21.
02137
.
[5]
L.
Rubinge
r
et
a
l.
,
“
Maximizi
ng
virt
ual
m
eetings
and
conf
er
enc
es:
a
rev
ie
w
of
best
pra
ct
i
ce
s,
”
Int.
Or
thop.
,
vol.
44
,
no.
8
,
pp
.
1461
-
1466,
2020
,
doi
: 10.1007/
s00264
-
020
-
04615
-
9.
[6]
R.
Diesc
h,
M.
Pfaff,
and
H.
Krcm
ar,
“
A c
om
pre
hensive
m
odel
of
informati
on
sec
ur
ity
f
actors for
dec
ision
-
m
ake
rs,
”
Comput.
Se
cur.
,
vol.
92
,
2020
,
do
i:
10
.
1016/j.c
ose
.
2020.
101747
.
[7]
A.
H.
Ali, L
.
E.
George
,
and
M. R.
Mokhtar
,
“
An Adapt
ive
H
igh
Capa
c
ity
Model for Sec
ure
Audi
o
Com
m
unic
at
io
n
Based
on
Frac
ta
l
Coding
and
Uni
form
Coeff
ic
i
ent
Modulat
ion
,
”
C
ircui
ts,
S
yst.
S
ig
nal
Proce
ss
.
,
vol
.
39,
no
.
10
,
pp
.
5198
-
5225,
202
0,
doi
:
10
.
1007/s
00034
-
020
-
01409
-
7.
[8]
D.
Kaga
n
,
G.
F.
Alper
t
,
and
M.
Fire,
“
Zoo
m
ing
Into
Vide
o
Confer
en
ci
ng
Privacy
and
S
ec
uri
t
y
Thr
eats,
”
Cryptography
a
nd
Sec
uri
ty
,
202
0.
[9]
A.
Mahr,
M.
Cic
hon,
S.
Mate
o,
C.
Graje
da
,
and
I.
Baggi
li,
“
Zooming
int
o
the
pande
m
ic
A
fore
ns
ic
ana
l
y
sis
of
th
e
Zoom Appli
cati
on,
”
Forensic
Sc
i.
In
t. Digi
t
.
In
ves
ti
g.
,
vol
.
36
,
p
.
301107,
2021
,
d
oi:
10
.
1016/j.fsi
di.
2021.
301107
.
[10]
C.
Li
ng
,
U.
Balcı,
J.
Bl
ac
kburn
,
and
G.
String
hini
,
“
A
first
lo
ok
at
zoombombing,
”
2021
IE
EE
S
ymposium
o
n
Sec
urit
y
and
Pri
vac
y
(
SP)
,
2021,
vol. 1,
pp.
1452
-
1467,
d
oi
:
10
.
1
109/SP
40001.
2021.
00061
.
[11]
M.
M.
Archi
bald,
R.
C.
Am
ba
gtshee
r,
M.
G.
Case
y
,
and
M.
La
wless,
“
Us
ing
Zoom
Videoconfere
nc
ing
for
Quali
t
at
iv
e
Data
Coll
ection:
Per
ce
pt
ions
and
Ex
per
ie
n
ce
s
of
Res
ea
rch
ers
and
Par
ti
ci
p
ant
s,
”
Int
.
J.
Qual.
Me
thods
,
vol.
18
,
pp
.
1
-
8
,
2019,
doi
:
10
.
11
77/1609406919874596.
[12]
Z.
Kristóf,
“
Internat
ion
al
Tre
nds
of
Remote
Te
ac
hing
Ordere
d
i
n
Li
ght
of
the
Coronavi
rus
(COV
ID
-
19)
and
i
ts
Mos
t
Popular
Video
Confer
en
ci
n
g
Applic
ations
t
hat
Im
ple
m
ent
C
om
m
unic
at
ion,
”
Cent
.
Eur
.
J.
Ed
u
c.
R
es.
,
vol
.
2,
no.
2
,
p
p
.
84
-
92
,
2020,
doi:
10.
37
441/CE
JER/202
0/2/
2/7917
.
[13]
N.
A.
Khan,
S.
N.
Brohi,
and
N.
Za
m
an,
“
Ten
Dea
dl
y
C
y
ber
Secur
ity
Thr
eats
Am
id
CO
VI
D
-
19
Pandemic,”
TechR
x
iv
Powe
r
ed
by
IE
EE
,
pp
.
1
-
6,
2020
,
doi
:
1
0.
36227/techr
xiv
.
12264722.
v1
.
[14]
C.
Nash,
“
Repor
t
on
Digi
ta
l
Lite
racy
in
Aca
d
emi
c
Mee
ti
ngs
duri
ng
the
2020
COV
ID
-
19
Loc
kdo
wn,”
Chal
le
nges
,
vol.
11
,
no
.
2
,
20
20,
doi
:
10
.
3390
/c
ha
ll
e11020020
.
[15]
R.
Singh
and
S.
Aw
asthi
,
“
Upd
at
ed
compar
at
iv
e
ana
l
y
sis
on
vi
deo
conf
er
enc
in
g
pla
tforms
-
Zoom,
Google
Mee
t,
Microsoft
Team
s,
W
ebE
x
Te
am
s
and
GoToMee
ti
ngs,”
EasyCha
ir
world
Sci
.
,
pp
.
1
-
9,
2020,
[On
li
ne]
.
Available:
htt
ps://
ea
s
y
ch
ai
r.org/publi
c
ations/
pre
print/F
q7T
[16]
D.
Pow
er
and
R.
Hadidi
,
“
Im
pac
t
s
of
the
Globa
l
Hea
lt
h
Cr
isis
on
the
Us
e
of
In
for
m
at
ion
Technol
o
gie
s,”
J.
Midwe
s
t
Assoc.
Inf
.
S
yst.
,
vol.
2021
,
no
.
1
,
2021,
doi
:
10
.
17
705/3j
m
wa.
0000
62.
[17]
A.
Chawla
,
“
Coronavi
rus
(COV
ID
-
19)
–
‘Zoom’
Applic
at
ion
Boon
or
Bane
,
”
SS
RN
Ele
ct
ron.
J
.
,
202
0,
doi:
10
.
2139/ssrn.3606716.
[18]
D.
M.
de
Olive
ira
Dias,
D.
R.
de
O.
Alber
gar
ia
s
Lope
s,
and
A.
C.
Te
le
s,
“
W
il
l
Virtua
l
Re
pla
c
e
Cla
ss
room
Te
a
chi
ng
?
L
essons
from
Virtua
l
Cla
ss
es
via
Zoo
m
in
the
Ti
m
es
of
COV
ID
-
19,
”
J.
Adv.
Edu
c.
Ph
il
os.
,
vol.
4,
no.
5,
2020,
doi
:
10
.
36
348/j
a
ep.
2020
.
v
04i05.
004.
[19]
S.
Ism
ai
l
,
and
S
.
Ism
ai
l
,
“
Te
ac
h
i
ng
Approac
h
using
Microsoft
Team
s:
Case
Stud
y
on
Sati
sfac
ti
on
ver
sus
Barr
ie
rs
in
Online
Le
a
rni
ng
Envi
ronm
ent
,”
Journal
of
Ph
ysic
s:
Confe
ren
ce
Serie
s
,
v
o
l.
1874
,
20
21,
doi:
10
.
1088/17
42
-
6596/1874/
1/
012020
.
[20]
Stor
y
a
l,
“
Th
e
pr
os
and
cons
of
Microsoft
Team
s
|
Story
a
ls
Blog
,
”
Dr
iv
in
g
micro
soft
365
Adoptio
n
,
2020.
[Onl
ine]
.
Avail
ab
le
:
htt
ps:
//
stor
y
al
s
.
com/bl
og/pros
-
and
-
con
s
-
of
-
m
ic
rosoft
-
team
s
[21]
E
.
E
.
O
g
u
n
s
e
ye
a
n
d
S
.
O
.
A
k
i
n
o
l
a
,
“
E
m
p
i
r
i
c
a
l
Q
u
a
l
i
t
y
a
n
d
U
s
a
b
i
l
i
t
y
A
s
s
e
s
s
m
e
n
t
s
o
f
F
i
v
e
C
o
m
m
o
n
O
n
l
i
n
e
R
e
a
l
T
i
m
e
E
-
M
e
e
t
i
n
g
P
l
a
t
f
o
r
m
s
,
”
J
o
u
r
n
a
l
o
f
S
c
i
e
n
c
e
a
n
d
L
o
g
i
c
s
i
n
I
C
T
R
e
s
e
a
r
c
h
,
v
o
l
.
6
,
n
o
.
2
,
p
p
.
2
7
1
4
-
3
6
2
7
,
2
0
2
1
.
[22]
O
.
H
u
g
h
e
s
,
“
G
o
o
g
l
e
M
e
e
t
v
i
d
e
o
-
c
o
n
f
e
r
e
n
c
i
n
g
a
n
d
c
h
a
t
a
p
p
:
A
c
h
e
a
t
s
h
e
e
t
,
”
S
o
f
t
w
a
r
e
-
T
e
c
h
R
e
p
u
b
l
i
c
,
2
0
2
0
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
t
e
c
h
r
e
p
u
b
l
i
c
.
c
o
m
/
a
r
t
i
c
l
e
/
g
o
o
g
l
e
-
m
e
e
t
-
v
i
d
e
o
-
c
o
n
f
e
r
e
n
c
i
n
g
-
a
n
d
-
c
h
a
t
-
a
p
p
-
a
-
c
h
e
a
t
-
s
h
e
e
t
/
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c
En
g
&
Co
m
p
Sci
IS
S
N:
25
02
-
4752
E
-
le
arnin
g
vi
rt
ua
l
meeti
ng
applicati
ons: A c
omp
ar
ative
st
udy fr
om a cybe
rsecurit
y
…
(
Nad
e
r A
bd
el
K
ari
m
)
1129
[23]
A
.
G
.
J
o
h
a
n
s
e
n
,
“
I
n
t
e
r
n
e
t
s
e
c
u
r
i
t
y
-
e
m
e
r
g
i
n
g
-
t
h
r
e
a
t
s
-
z
o
o
m
-
b
o
m
b
i
n
g
-
v
i
d
e
o
-
c
o
n
f
e
r
e
n
c
e
-
t
h
r
e
a
t
s
,
”
N
o
r
t
o
n
L
i
f
e
L
o
c
k
,
2
0
2
0
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
u
s
.
n
o
r
t
o
n
.
c
o
m
/
i
n
t
e
r
n
e
t
s
e
c
u
r
i
t
y
-
e
m
e
r
g
i
n
g
-
t
h
r
e
a
t
s
-
z
o
o
m
-
b
o
m
b
i
n
g
-
v
i
d
e
o
-
c
o
n
f
e
r
e
n
c
e
-
t
h
r
e
a
t
s
.
h
t
m
l
[24]
S.
Furnell,
W
.
Khern
-
am
-
nuai
,
R.
Esm
ae
l
,
W
.
Yang,
and
N.
Li,
“
Enha
nc
ing
se
cur
ity
b
eha
v
iour
b
y
supporting
t
he
user,
”
Comput.
S
ec
ur.
,
vol
.
75
,
pp
.
1
-
9
,
2018
,
doi
: 10.1016/
j
.
cose
.
2
018.
01.
016
.
[25]
A
.
B
a
s
i
t
,
M
.
Z
a
f
a
r
,
A
.
R
.
J
a
v
e
d
,
a
n
d
Z
.
J
a
l
i
l
,
“
A
N
o
v
e
l
E
n
s
e
m
b
l
e
M
a
c
h
i
n
e
L
e
a
r
n
i
n
g
M
e
t
h
o
d
t
o
D
e
t
e
c
t
P
h
i
s
h
i
n
g
A
t
t
a
c
k
,
”
2
0
2
0
I
E
E
E
2
3
r
d
I
n
t
e
r
n
a
t
i
o
n
a
l
M
u
l
t
i
t
o
p
i
c
C
o
n
f
e
r
e
n
c
e
(
I
N
M
I
C
)
,
2
0
2
0
,
p
p
.
1
-
5
,
d
o
i
:
1
0
.
1
1
0
9
/
I
N
M
I
C
5
0
4
8
6
.
2
0
2
0
.
9
3
1
8
2
1
0
.
[26]
S.
Young,
“
Zoombom
bing
Your
Toddl
er:
Us
er
Expe
ri
enc
e
and
the
Com
m
unic
ation
of
Zoom’s
P
riva
c
y
Cr
isis,”
J.
Bus.
Tech
.
Com
mun.
,
vo
l. 35, no
.
1
,
pp
.
147
-
153
,
Jan.
2021,
doi:
10.
1177/105065
19209
59201.
[27]
M.
Said
El
sa
y
e
d,
N.
A.
L
e
-
Kh
ac
,
and
A.
D.
Jurcut,
“
Dea
li
ng
with
COV
ID
-
19
net
work
tra
ff
ic
spikes,
”
in
IEEE
Sec
urit
y
&
Priv
acy
,
vol
.
19
,
no
.
1
,
pp
.
90
-
94
,
Jan
.
-
Feb.
2021
,
doi
:
1
0.
1109/MS
EC.
2
020.
3037448
.
[28]
F.
Porpiglia
e
t
al.
,
“
Tra
di
ti
ona
l
and
Vir
tua
l
Co
ngre
ss
Mee
ti
ngs
During
th
e
CO
VID
-
19
Pandemic
and
th
e
Pos
t
-
COV
ID
-
19
Era
:
Is
it
Ti
m
e
to
Change
th
e
Para
digm
?
,
”
Eur.
Ur
ol
.
,
vol
.
7
8,
no.
3
,
pp.
301
-
303,
2020
,
doi:
10
.
1016/j.e
u
ruro.
2020.
04
.
01
8
.
[29]
P
.
G
a
n
e
s
h
a
,
A
.
B
.
D
.
N
a
n
d
i
y
a
n
t
o
,
a
n
d
B
.
C
.
R
a
z
o
n
,
“
A
p
p
l
i
c
a
t
i
o
n
o
f
O
n
l
i
n
e
L
e
a
r
n
i
n
g
D
u
r
i
n
g
t
h
e
C
o
v
i
d
-
1
9
P
a
n
d
e
m
i
c
t
h
r
o
u
g
h
Z
o
o
m
M
e
e
t
i
n
g
a
t
K
a
r
y
a
M
e
k
a
r
E
l
e
m
e
n
t
a
r
y
S
c
h
o
o
l
,
”
I
n
d
o
n
e
s
.
J
.
T
e
a
c
h
.
S
c
i
.
,
v
o
l
.
1
,
n
o
.
1
,
p
p
.
1
-
8
,
2
0
2
1
.
[30]
A.
Aiken
,
“
Zoo
m
ing
in
on
pr
i
vacy
concerns:
Video
app
Zoo
m
i
s
surging
in
popula
r
ity
.
In
our
rush
to
st
a
y
conne
c
te
d
,
we
nee
d
to
m
ake
sec
urity
checks
and
not
rev
ea
l
m
ore
tha
n
we
thi
nk,
”
Inde
x
Censors
h
.
,
vol.
49,
no
.
2,
pp.
24
-
27
,
2020
,
doi: 10.
1177
/03
06422020935792
.
[31]
N.
Yam
an
and
M.
Muhlis,
“
S
tude
nts
'
social
pre
s
enc
e
and
p
erc
e
ive
d
l
ea
rn
in
g
towar
d
CCU
cour
se
in
online
cl
assroom
(An
eva
luating
of
lear
ning
proc
ess
during
pande
m
ic
c
orona
virus)
,”
Elit.
Eng
li
sh
Lit.
J
.
,
vol
.
7,
no.
1
,
p.
61
,
2020
,
doi
: 10.24252/
e
li
t
e.
v
7i1a
6.
[32]
Google
Support,
“
Google
Mee
t
Secur
i
t
y
&
Privacy
for
users,”
2020.
[Online
]
.
Avail
able
:
htt
ps://
support
.
g
oogle
.
com/m
ee
t/answ
er/
9852160
?
h
l=en#:~:
t
ext=
All%20da
t
a%
20
in%20Mee
t%20
i
s,e
ncr
y
pt
ed%
20
at
%20re
st%20b
y
%20de
fau
l
t
[33]
Zoom,
“
Zoom,
Help
Cen
te
r
,
”
2020.
[Onlin
e]
.
Avai
la
bl
e:
h
ttps
:/
/support.zoo
m
.
us
/hc
/e
n
-
us/ar
ti
cles/20136215
3
-
Sharing
-
y
ou
r
-
scr
ee
n
-
con
te
nt
-
or
-
sec
ond
-
c
amera
[34]
Google,
“
Google
Mee
t
sec
urity
&
priva
c
y
for
admins,”
2020.
[Online
]
.
Avail
able
:
htt
ps://
support
.
g
oogle
.
com/a/answ
er/
7582940
?
hl
=e
n
[35]
Microsoft,
“
Mic
rosoft
Docs,” 20
20.
[Onlin
e]
.
Av
ai
l
abl
e
:
ht
tps:/
/d
ocs.
m
ic
rosoft.
co
m
/e
n
-
us/welc
om
e
-
to
-
docs
[36]
L.
B.
Andr
ews,
C.
Nac
e
,
and
A.
Chow,
“
Road
W
arr
iors
to
Zoo
m
Master
s:
Deve
lopment
of
th
e
ACG
ME
Remot
e
Acc
red
i
ta
t
ion
a
nd
Rec
ogni
ti
on
Site
Visit
,”
J.
Gr
ad.
Me
d
.
Educ
.
,
vol
.
1
3,
no.
4
,
pp.
597
-
601,
202
1,
doi:
10
.
4300/j
g
m
e
-
d
-
21
-
00654.
1
.
[37]
D
.
K
n
e
ž
e
v
i
ć
,
“
1
0
P
r
o
s
a
n
d
C
o
n
s
o
f
M
i
c
r
o
s
o
f
t
T
e
a
m
s
-
T
e
a
m
s
’
A
d
v
a
n
t
a
g
e
s
a
n
d
D
i
s
a
d
v
a
n
t
a
g
e
s
i
n
2
0
2
1
,”
O
f
f
i
c
e
3
6
5
&
S
h
a
r
e
P
o
i
n
t
O
n
l
i
n
e
,
2
0
1
8
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
s
y
s
k
i
t
.
c
o
m
/
b
l
o
g
/
1
0
-
p
r
o
s
-
a
n
d
-
c
o
n
s
-
of
-
m
i
c
r
o
s
o
f
t
-
t
e
a
m
s
/
[38]
P.
W
age
nseil
,
“
Zoom
sec
urity
i
ss
ues:
Here
’s
eve
r
y
thi
ng
th
at
’s
gone
wrong
(s
o
far
),
”
S
ec
urit
y
,
2021.
[Onlin
e]
.
Avail
ab
le
:
htt
ps:
//
ww
w.t
om
sguide.
com/news/z
oo
m
-
sec
urity
-
privac
y
-
wo
es
[39]
G.
Kara
ntzas
an
d
C.
Patsaki
s,
“
An
Empiric
al
As
sessment
of
Endpoi
nt
Detect
io
n
and
Response
Sy
st
ems
aga
inst
Advanc
ed
Pe
rsistent T
hre
at
s At
tack
Vec
tors,
”
J
.
Cybe
rs
ec
ur.
Pri
v
.
,
vol
.
1
,
no
.
3
,
pp.
387
-
421
,
20
21.
[40]
R
.
P
a
n
c
h
a
l
a
n
d
D
.
J
a
d
h
a
v
,
“
A
R
e
v
i
e
w
O
n
P
r
o
t
e
c
t
i
o
n
A
g
a
i
n
s
t
F
i
l
e
l
e
s
s
M
a
l
w
a
r
e
A
t
t
a
c
k
s
U
s
i
n
g
G
a
t
e
w
a
y
,
”
T
u
r
k
i
s
h
J
o
u
r
n
a
l
o
f
C
o
m
p
u
t
e
r
a
n
d
M
a
t
h
e
m
a
t
i
c
s
E
d
u
c
a
t
i
o
n
,
v
o
l
.
1
2
,
n
o
.
1
0
,
p
p
.
7
3
0
2
-
7
3
0
7
,
2
0
2
1
,
d
o
i
:
1
0
.
1
7
7
6
2
/
t
u
r
c
o
m
a
t
.
v
1
2
i
1
0
.
5
6
2
0
.
[41]
“
Zoom,
Google
Mee
t
And
Mi
cro
soft
Team
s
Are
Hac
k
ers
N
ew
Favourit
e
T
oo,
”
2020.
[Online
]
.
Availabl
e:
htt
ps://
ti
m
esofin
dia
.
indi
a
ti
m
es.
c
om
/ga
dget
s
-
new
s/zoom
-
google
-
m
ee
t
-
and
-
m
ic
ros
oft
-
team
s
-
are
-
ha
cke
rs
-
new
-
fav
ourite
-
too/art
ic
l
eshow/75708403.
cms
.
[42]
Google
Support,
“
Advanc
ed
phis
hing
and
m
al
w
a
re
prot
ec
t
ion
-
Google
W
orkspac
e
Adm
in
Help
,
”
202
1
.
[Onlin
e
]
.
Avail
ab
le
:
htt
ps:
//
support.
goog
le
.
com/a/
answer/
9
157861
?
h
l=en
[43]
P.
Unchit
,
S
.
Das,
A.
Kim
,
an
d
L.
J.
C
amp,
“
Quanti
f
y
ing
Sus
ce
pti
bi
li
t
y
to
Spear
Phis
hing
i
n
a
High
Scho
o
l
Envi
ronm
ent
Us
ing
Signal
Dete
c
ti
on
The
or
y
,
”
Int
ernati
onal
Symp
osium
on
Hum
a
n
Aspec
ts
of
Information
Sec
urity
and
Assur
ance
,
2020,
pp
.
109
-
1
20,
doi
:
10
.
1007
/978
-
3
-
030
-
5740
4
-
8
_
9
.
[44]
B.
Pranggono
a
nd
A.
Arabo,
“
COV
ID
‐19
pan
demic
c
y
ber
se
cu
rity
issues,”
Int
e
rnet
Technol.
Lett
.
,
vol.
4
,
no.
2
,
pp.
4
-
9
,
2021
,
d
oi:
10
.
1002/itl2.247
.
[45]
L.
O’D
onnel
l
,
“
Microsoft
Team
s
Phis
hing
Atta
ck
Ta
rg
et
s
Offi
ce
365
Us
er
s,”
Thr
eat
post.
com
,
2020.
[Online
]
.
Avail
ab
le
:
htt
ps:
//
threat
post
.
com/
Microsoft
-
team
s
-
phishing
-
office
-
365/160458/
[46]
A
.
Secur
ity
,
“
Microsoft
Te
ams
Im
per
sonati
on
-
Abn
orm
al
Secur
ity
,
”
2020
.
[
Online
]
.
Avai
la
bl
e:
htt
ps://
abnor
m
als
ec
urity
.
com/blo
g/microsoft
-
te
ams
-
impersonati
on/
[47]
B.
Hea
ld,
“
Nere
us:
A
Propos
al
for
Im
ple
m
ent
in
g
Anti
-
phishing
Software
N
ereus
:
A
Propos
al
for
Im
ple
m
ent
in
g
Anti
-
phishing
S
oftwa
re
Us
ing
Corpora
te
Brand
ing
Color
Ma
tching
Us
ing
Cor
pora
te
Brandi
ng
Color
Mat
chi
n
g,
”
Thesis,
Roc
h
ester
In
stit
ut
e
of
Tec
hnology
,
2020,
[
Online
]
.
Avai
la
b
le
:
htt
ps:
//
schol
a
rworks
.
rit
.
edu/
th
ese
s/10644/
[48]
J.
Sulta
n
a
and
A.
K.
Jil
ani
,
“
Cla
ss
if
y
ing
C
y
ber
at
t
ac
ks
Am
id
Covid
-
19
Us
ing
Support
Vec
tor
Mac
hine
,”
Se
curity
Inc
ide
n
ts
&
Re
s
ponse
Agai
nst
C
ybe
r A
tt
ac
ks
,
pp.
161
-
175
,
2021,
doi:
10
.
1007/97
8
-
3
-
030
-
69174
-
5_8
.
[49]
J.
Rei
sac
her
,
“
D
o
Not
Forget
to
Secur
ely
Lo
ck
Your
Data
in
M
ic
rosoft
Team
s,”
Cybe
r
Defe
nse
Magazine
,
2020
.
[Online
]
.
Avai
lable:
htt
ps:
//
ww
w.cy
ber
d
efe
nsem
a
gaz
in
e.com/do
-
not
-
forge
t
-
to
-
sec
u
rely
/
[50]
N.
A
.
Kari
m
and
Z.
Shukur,
“
Us
ing
pre
fer
en
ce
s
as
user
ide
nti
f
icati
on
in
th
e
online
exa
m
ination,”
Int.
J
.
Ad
v.
Sc
i
.
Eng.
In
f. Tec
hno
l.
,
vol
.
6
,
no
.
6
,
p
p.
1026
-
1032
,
2
016,
doi
:
10
.
185
17/i
ja
se
it.6.
6
.
14
12.
[51]
N.
A.
Kari
m
,
Z.
Shukur,
and
A.
E.
M.
AL
-
ban
na,
“
UIP
A
:
Us
e
r
aut
hentic
at
ion
m
et
hod
base
d
on
user
int
erf
a
c
e
pre
fer
en
ce
s fo
r
a
cc
ount
re
cove
r
y
proc
ess,”
J
.
Inf
.
Sec
ur. Appl
.
,
vol
.
52
,
Jun.
2020,
doi:
10
.
1016/j.ji
s
a.
2020.
102466
.
Evaluation Warning : The document was created with Spire.PDF for Python.