StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Threats and Methods to Secure a VoIP Network - Essay Example

Cite this document
Summary
Technology is a double-edged sword. The more conveniences and benefits we derive from latest developments, the more insecure we grow. VOIP is a fast growing technology, as it is very simple, cost effective and does not need any special equipment other than a computer and a phone line…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Threats and Methods to Secure a VoIP Network
Read Text Preview

Extract of sample "Threats and Methods to Secure a VoIP Network"

Download file to see previous pages

People were mostly concerned with its cost, functionality and reliability. Today, VoIP is growing to the point where companies of almost any size in any industry know how to take advantage of the cost savings and other emerging added features in VoIP. As VOIP is gaining wide acceptance and becoming one of the mainstream communication technologies, security has become a major issue. Network Administrators are finding themselves in a tough position of providing their clienteles with the security and reliability that they have grown accustomed to over these years.

The threats to security and privacy could be in the form of DOS (denial of service), malformed messages, sniffing, spoofing, vishing, VOIP spam and SPIT (spam over VOIP). The vulnerable components under threat through the use of VoIP could be access device application, management interface, network, tftp server. Means to secure the VOIP network could be VoIP Protocol, Session Border Protocol, or using the network devices. To protect networks from these threats, one of the key aspects is the methodology of securing information; that is, to conceal the signals and media in real time communications from unauthorized entities through cryptography.

But there is no single solution to secure a VOIP service network entirely the best practice is to integrate all possible solutions according to service model, network architecture, protocol model, target customers, peering partners and so on.With increasing use of this technology combined with modern technology and its users, VoIP faces many security issues that need to be covered and prevented in order to make this technology as one of the best for the companies. Therefore this dissertation will examine some security concerns and protection methods by analyzing the threats to VoIP network and consequently determine how to deal with them from design, quality of service and management perspectives.1.2 Introduction As with IT security, there are a multitude of threats to a VoIP network that can make it difficult to secure VoIP telephony.

DoS attacks, message tampering, proxy impersonation, registration hijacking are but a few of the problems telephony managers may encounter as they try to secure VoIP networks. The security of private data, whether in organizations or industries, is becoming more crucial and relevant each day. VOIP technology also needs to continually improve and update its security defenses in terms of reliability and quality. As internet telephony comes to handle more data, it becomes an easy target for cyber crime.

From the beginning of its inception, VOIP infrastructure has always been vulnerable to threats from other networked architectures. This happens due to the process of digitization, and encryption of voice, which is then compressed into small packets and sent over the Internet Protocol network systems. This technicality is presented in the VOIP system which can

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Threats and Methods to Secure a VoIP Network Essay”, n.d.)
Threats and Methods to Secure a VoIP Network Essay. Retrieved from https://studentshare.org/miscellaneous/1534705-threats-and-methods-to-secure-a-voip-network
(Threats and Methods to Secure a VoIP Network Essay)
Threats and Methods to Secure a VoIP Network Essay. https://studentshare.org/miscellaneous/1534705-threats-and-methods-to-secure-a-voip-network.
“Threats and Methods to Secure a VoIP Network Essay”, n.d. https://studentshare.org/miscellaneous/1534705-threats-and-methods-to-secure-a-voip-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF Threats and Methods to Secure a VoIP Network

Network Security as a Business Benefit

The paper "network Security as a Business Benefit" develops the assumption every organization needs its own proper security system to maintain its reputation.... Once a reliable system is built everything that goes on with the network can be evaluated with respect to that policy.... hellip; network can be defined as 'any set of interlinking lines resembling a net, for example, 'a network of Roads '.... Any interconnected system can be termed as a network....
6 Pages (1500 words) Case Study

Best Practices for Network Security

ramatically, these worms and viruses have increased and leading to secure the network in all ways (Abelson H.... This report "Best Practices for network Security" discusses best practices for network security that are the actions, plans, and steps taken to ensure that the network is always safe and secured.... It is something that is so compromising for a network without a security policy.... employer's information) in the network depends on the practices that are applied for security....
8 Pages (2000 words) Report

Four Fundamental Cyber Security Components

In addition, a thorough review of the existing literature on cyber threats and cyber security was conducted.... Your task is to investigate the need for cyber security and analyze the threats from which it protects business.... Name: Course: Tutor: Date: Executive summary This paper gives a detailed report on investigation on the need for cyber security and analyzes the threats from which it protects business.... Your task is to investigate the need for cyber security and analyze the threats from which it protects business....
13 Pages (3250 words) Essay

Physical Security Related to Computer Systems

Next, the approaches that can be used for the determent of physical attacks and the security measures that can be taken to secure the hardware, network and power supply, have been discussed in detail.... A list of physical security threats has been given which are very likely to occur with a technology-based system.... How these threats occur and what techniques an intruder may use to enter into and hack a system, has been given consideration....
8 Pages (2000 words) Term Paper

The Basic Architecture of a Secured Network

The paper "The Basic Architecture of a Secured network" highlights that each component of the entire network can be simulated using a model and the theoretical values of Overall Security Values can be determined.... This would help in rightly choosing the modifications required to the existing network.... Since these systems serve a number of networks, they create a bridge bypassing the firewalls and network segments.... The security of servers becomes an important issue when it is exposed to such an un-trusted network....
10 Pages (2500 words) Case Study

Role of Network Security: How Does It Protect You

From the paper "Role of network Security: How Does It Protect You" it is clear that network security is a very challenging and difficult task.... Once a reliable system is built everything that goes on with the network can be evaluated with respect to that policy.... This system is so designed that authorization of access to data in a network is controlled by the network administrator only without the interference of any other person....
6 Pages (1500 words) Essay

Best Practices for Network Security

Dramatically, these worms and viruses have increased and leading to secure the network in all ways (Abelson H.... This report "Best Practices for network Security" sheds some light on the actions, plans, and steps taken to ensure that the network is always safe and secured.... hellip; It is something that is so compromising for a network without a security policy.... employer's information) in the network depends on the practices that are applied for security....
8 Pages (2000 words) Report

Information Technology and Information System Security

It is a methodology implemented on the basis of different types of threats, vulnerabilities, and methods of system attack in relation to security threats.... This methodology is ideal for this exercise simply because it identifies threats and it could help me to define the risk mitigation policies for my computer systems and information resources.... This clearly indicates that modifications such as developing a more generic methodology should be considered to minimize the exposure of my computing system and data to huge threats and vulnerabilities....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us