We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

E-commerce: VOIP Security - Essay Example

Comments (0)
Summary
E-commerce: VOIP Security Introduction VoIP refers to the abbreviation of voice Over Internet Protocol. This terminology refers to the communication technology used for transimitting sound signals via the internet. The voice in this case becomes converted into binary form in order to be relayed digitally through the internet…
Download full paper
GRAB THE BEST PAPER
E-commerce: VOIP Security
Read TextPreview

Extract of sample
E-commerce: VOIP Security

Download file to see previous pages... This can be done by diverting the direction of the call. A person with the information of the ongoing call can tap into it and redirect the call to another place. Having done that, the person can then wait to decode the call after acquiring the cryptography key. More companies now prefer using the technology to communicate internally and with other businesses. This has raised the concern of how safe the technology can be in relaying sensitive information. Recently, big organisations have fallen victim of security attacks via the internet. Some organisations have lost billions of dollars to hackers and other E-Criminals. These criminals range from old experienced tech savvy people to Elementary School kids. With the cyber world having so many criminals, transmitting sensitive information through the internet has raised questions about the security implications of the system. Literature Review about the use of VoIP Some companies have employed the use of VoIP in theirbusiness transactions.In this case scenario, we will investigate the use of VoIP.VoIP has overriden the use of POTS (Plain Old Telephone System) in several businesses. Different variations of VoIP exist namely: 1. Self Provided –this becomes used by individuals who use applications such as skype which allows video conferencing from personal computer to personal computer.This can also be done through phones that have webcams such as the iPhone. 2. IP Telephony: a. Independent IP Telephony –this does not depend on the serivces of an internet Service Provider. Users of different personal computers connect directly and communicate with each other. b. Dependent IP Telephony –there has to be internet for this kind of VoIP to communicate. Mostly done over long distances via internet connection. 3. Business LAN (Local Area Network) or WAN (Wide Area Network)–here the POTS become replaced by a network. A research conducted in South Africa showed that self provided VoIP has proven to be the most successful of all kinds of Voice over Internet Protocol (Uys 2005). The popularity of self provided VoIP comes as a result of it being common and more secure than other forms of VoIP. Its popularity lingers in home use. The sale of mobile handsets has reduced significantly in some parts of the world due to the availabiltity of the VoIP services. The only factor that makes the sale of mobile handsets constant relies on the mobility of the devices and the availability of the VoIP service in the some of the handsets.With laptops now being able to integrate the processing power of desktops and communication capabilities of cell phones, mobile handsets face tough competition. The only advantage that hand held gadgets have over laptops lies in their smaller sizes and being easier to carry. Several major companies and organisations in the world have adopted the use of VoIP in their services (Mathiyalakan 2006). These include: 1. Bank of America which has over180000 VoIP phones in all of its branches. 2. Boeing plans to equip 150000 of its workers with VoIP. 3. Ford got into a deal with SBC to have over 50000 VoIP phones installed. 4. Vonage gets new subscribers at the rate of 15000 per week with over 600000 cutomers already in place. 5. The main telecommunications player in UK; BT installed VoIP as of 2009. Three types of gadgets exist that help enable users to make VoIP calls. These devices consist of: ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Network Security: a vital element in today's commerce
A Virtual Private Network is an innovative concept since it allows clients to securely communicate over an insecure medium. A VPN enables enterprises to maintain connection between private networks in a secured manner. In addition, the use of a VPN is extremely crucial since effective internet communication is impossible to achieve without proper networks.
8 Pages(2000 words)Essay
Significant Importance of E-Commerce Security
From this paper, it is clear that E-commerce has given a boost to the financial sector tremendously, especially the banking sector which now enjoys a larger customer portfolio and, in return. In today’s dynamic world companies spent heavily on their IT departments for the technical support to smoothly run their e-commerce activities.
7 Pages(1750 words)Research Paper
E-commerce Security
Online stores business management have become a prodigious task for entrepreneurs who are now inventing brand technologies in order to make their online stores a success. Online business value their website appearances, navigation, content placements, ease of search for their products and services, frequent editing flexibility, payment gateways
5 Pages(1250 words)Assignment
Study of protocols in a VoIP network
The trend started in the early 1990s with the e-mail that has now displaced the regular mail or snail mail for written communications. Then came instant text messaging applications like Microsoft Messenger, Yahoo Messenger, ICQ, and AOL Instant Messenger.
16 Pages(4000 words)Essay
The security technology of e-commerce
In today’s internet environment, the consumer faces a lot of risks while conducting business through the internet. Many financial crimes are being carried out on the internet such as frauds, identity thefts, cyber attacks, cyber Terrorism, cyber attacks during the war on terrorism, viruses and worms, hacking and malware techniques.
8 Pages(2000 words)Essay
Commerce as the Transfer of Goods and Services
This essay analyzes that commerce, as it is, is the transfer of goods or/and services from one person often called the seller to another person known as the buyer or consumer of the goods or services. There is a need for an agreement between the two parties that are doing business on issues such as price, a form of the goods or services, mode of payment.
12 Pages(2250 words)Coursework
E-commerce
study which addresses the questions of how British Airways framed its business and utilize the opportunity to reach out to its clientele and eventually treated e-commerce as more efficient than conventional market schemes with respect to costing and gaining online customer trust
10 Pages(2500 words)Essay
The Security payment in E- commerce
Credit card fraud is the most common internet crime these days. There has been much research on this subject and many solutions have been devised to make online business transactions more secure. Some of the solutions will be discussed that make the
8 Pages(2000 words)Essay
E-Commerce and IT Security
In this context, the transformation of cell phones to an indispensable tool of communication can be characterized as expected; cell phones today have become a necessity but the margins of their role have been expanded more than initially estimated. In fact, in their
10 Pages(2500 words)Essay
VOIP security (information technology)
The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack. VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of
3 Pages(750 words)Essay
Let us find you another Essay on topic E-commerce: VOIP Security for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us