VoIP or Voice over Internet Protocol is the technology which carries voice communications over packet switched networks or the IP networks such as the Internet. But VoIP networks are weak and are vulnerable to attacks. In my paper I will discuss the five security concerns…
In most of the cases the people don’t know that someone is between them and they believe that they are talking in a secure private network. (Ransome & John W, 2005) The attacker controls the entire conversation and intercepts all the messages then injects new ones. This the reason that we should not give any personal information to each other using VoIP networks because it is vulnerable to man in the middle attack.
VoIP networks are also vulnerable to Phreaking attacks. Phreaking is the subculture activity of people we study and then experiment with telecommunication systems such as the public telephone systems. Today when telephone systems have become computerized this word is closely related to computer hacking. (Endler & Mark D, 2007) In a VoIP network the hackers alters different frequencies to get hold of the call. The attackers can manipulate the entire phone system. The use of Phreaking began when automatic switches were used in the telephone systems.
VoIP networks are also vulnerable to vishing. It’s another term for VoIP Phishing. It is basically a criminal practice which uses social engineering over a telephone network. It can use the features used by VoIP networks to gain access to personal information of anyone for the purpose of reward. (Porter, 2006) The attacker makes a call and pretends to be a representative of a trust worthy organization such as your bank to gain access to your personal bank details. To avoid this kind of attack you should never give any private or confidential information through a telephone network. This is the reason that trusted companies like PayPal and other banks never ask for your personal information through emails and automated phone calls. (Porter, 2006)
VoIP Spam is the repeated dialing of unwanted pre recorded phone calls with the help of VoIP features. This attack is ...
Cite this document
(“VOIP security (information technology) Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/397035-voip-security-information-technology
(VOIP Security (information Technology) Essay Example | Topics and Well Written Essays - 750 Words)
“VOIP Security (information Technology) Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.net/miscellaneous/397035-voip-security-information-technology.
Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval. The use of cryptography in this case tries to prevent eavesdropping by unwelcome parties.Even with the use of cryptography to protect calls; hijacking of calls also proves to be a major threat.
In addition, IP-PBX is particularly useful for carrying out various business activities or enterprises that require upholding continuous communication link with business associates as well as customers that are remotely connected to the business. Thus, IP-PBX is a system to supervise and manage a corporation all through the globe.
13 Intrusion-prevention systems (IPS) 14 Software Systems 15 Multilayer Security 15 Conclusion 15 16 16 VoIP Security Problem and Solution Voice over Internet Protocol (VoIP) is a famous buzzword these days. It is a modern technology based communication or way of data transmission over the phone just around the corner.
The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world.
The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to unauthorized parties (Feruza and Kim 2007, pp.19).
These new techniques will lay the foundation for solving the mentioned issues from a different angle, which is expected to improve the security and QoS of the existing approach.The paper will involve an understanding of the current security implications of VoIP, and to run VoIP in a safe, secure manner.
According to the Consultant practice IDC, VOIP represented in 2002 a market of 2.3 billions dollars, and according to Idate in 2010, 70% of the phone line in business world will be running on IP port.
Like with any new technology, in the early days of VOIP, there were no serious concerns about security related to its use.
n of this paper deals with such an evolving technology called MOST (Media Oriented Systems Transport) which is a high speed multimedia network to access multimedia devices on demand as stated in MOST.com (2008).
The second technology in discussion is VOIP. The Voice over
On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own computer. However, the most commonly used scenarios
2 Pages(500 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic VOIP security (information technology) for FREE!