Sunday, April 28, 2019
Threats and Methods to Secure a VoIP Network Essay
Threats and Methods to Secure a VoIP Network - Essay ExamplePeople were by and large concerned with its cost, functionality and dependableness. Today, VoIP is growing to the point where companies of almost any size in any indus experiment roll in the hay how to take advantage of the cost savings and other emerging added features in VoIP. As VOIP is gaining wide adoption and becoming iodine of the mainstream communication technologies, security has become a major issue. Network Administrators are purpose themselves in a tough position of providing their clienteles with the security and reliability that they have grown accustomed to everyplace these years.The threats to security and privacy could be in the form of DOS (denial of service), malformed messages, sniffing, spoofing, vishing, VOIP spam and SPIT (spam everyplace VOIP). The vulnerable components under threat done the use of VoIP could be access device application, management interface, network, tftp server. content t o secure the VOIP network could be VoIP Protocol, Session Border Protocol, or using the network devices.To protect networks from these threats, one of the key aspects is the methodology of securing information that is, to conceal the signals and media in real time communications from unauthorized entities through cryptography. But there is no single solution to secure a VOIP service network just the best practice is to integrate all possible solutions according to service model, network architecture, protocol model, come out customers, peering partners and so on.With increasing use of this technology combined with modern technology and its users, VoIP faces many security issues that convey to be covered and prevented in order to make this technology as one of the best for the companies. thence this dissertation will examine some security concerns and protection methods by analyzing the threats to VoIP network and consequently forge how to deal with them from design, quality of service and management perspectives.1.2 Introduction As with IT security, there are a the great unwashed of threats to a VoIP network that can make it difficult to secure VoIP telephony. DoS attacks, message tampering, proxy impersonation, adjustment hijacking are but a few of the problems telephony managers may encounter as they try to secure VoIP networks. The security of private data, whether in organizations or industries, is becoming more crucial and relevant to each one day. VOIP technology also needs to continually improve and update its security defenses in terms of reliability and quality. As internet telephony comes to handle more data, it becomes an easy target for cyber crime. From the beginning of its inception, VOIP infrastructure has ceaselessly been vulnerable to threats from other networked architectures. This happens due to the process of digitization, and encryption of voice, which is then compressed into small packets and sent over the Internet Protocol netwo rk systems. This technicality is presented in the VOIP system which can
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment