Nobody downloaded yet

Service and the Security implication of VOIP - Dissertation Example

Comments (0) Cite this document
FRONT COVER Service and Security Implications of VoIP [Of author] 2011 2011 M.Sc. TITLE PAGE Service and Security Implication of VoIP by Dissertation submitted to the University of Derby in partial fulfilment of the requirements for the award of Master of Science in add name of programme here Abstract This dissertation is about the practical use of Voice over IP…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
Service and the Security implication of VOIP
Read TextPreview

Extract of sample "Service and the Security implication of VOIP"

Download file to see previous pages The use and importance of telecommunication in business cannot be overstressed. In some industries, it is even their source if not the most important infrastructure that drives the business processes. However, in order to use the technology efficiently and effectively, its limitations and security has to be assessed and determined. The anonymity of the internet provides an added complexity to the challenge since the prosecution and detection of perpetuators is not only hard but the detection of an actual eavesdropping is already hard in itself. This dissertation will provide the best infrastructure that is both resilient and redundant that will provide the basic security to basic security threats. As proof of concept this dissertation will also demonstrate how an actual VoIP system can be set-up and used, this dissertation has also confirmed how an actual attack on the security can be done and its potential effect on the user. This dissertation also provided a technical strategy on how to remediate the security vulnerabilities. However, as any technical security strategy goes, there will always be a hacker that is better at overcoming the best and the latest security system. A determined hacker will always find a way to overcome any security system thrown in front of him thus this dissertation will provide recommendation that will protect businesses from falling prey to opportunistic and disreputable shady characters. Acknowledgement This author would like to thank his love ones for providing him with the inspirations to stay on track for him to be able to finish this dissertation. This author would also like to thank his instructor for providing him the chance and opportunity to learn not only from his instructor’s knowledge but also from the wisdom his instructor imparts. The practical way this author’s instructor presents solutions to complex problems have inspired this author to be better than what he perceive can become. This author’s instructor made him realise that this author can be more than what he want to be or could become. Table of Contents Abstract 3 Acknowledgement 4 Table of Contents 5 1.0Introduction 5 1.1 Overview 6 1.2 Existing Problems 7 1.3 Aims and Objectives 8 1.4 Project Objectives 9 1.5 Research Methodology 10 1.6 Structure of the Dissertation 12 2.0 Literature Review 13 Chapter Summary 26 3. 0 Methodology 28 4.0 Voice over IP Implementation and Threats and Vulnerabilities Demonstration 30 5.0 Statement of Result 49 6.0 Analysis AND Discussion 51 7.0 Conclusion 53 8.0 Recommendation 57 Reference List and Bibliography 61 Appendices 67 List of Figures: 67 List of Tables: 68 Asterisk installation guide 68 CentOS/Linux installation guide 68 1.0 Introduction Asterisk was developed as a cheap alternative to PBX by Mark Spencer. Since then the face of VoIP has never been the same again. Since 1989 the development of VoIP as an alternative transport system for telephony signalling has progress to a point that almost all of the telephone infrastructures all over the world are being used as data transporter along with voice channel. VoIP simply enabled telecommunication companies to maximize its infrastructure by making several channels available in a ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Service and the Security implication of VOIP Dissertation”, n.d.)
Retrieved from
(Service and the Security Implication of VOIP Dissertation)
“Service and the Security Implication of VOIP Dissertation”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Service and the Security implication of VOIP

E-commerce: VOIP Security

...questions about the security implications of the system. Literature Review about the use of VoIP Some companies have employed the use of VoIP in theirbusiness transactions.In this case scenario, we will investigate the use of VoIP.VoIP has overriden the use of POTS (Plain Old Telephone System) in several businesses. Different variations of VoIP exist namely: 1. Self Provided –this becomes used by individuals who use applications such as skype which allows video conferencing from personal computer to personal computer.This can also be done through phones that have webcams such as the iPhone. 2. IP Telephony: a. Independent IP Telephony –this does not...
18 Pages(4500 words)Essay


...other terms that can be used as an alternative of VoIP” (Davidson, 2007). Communication services such as SMS, voice messaging, facsimile etc. are the few examples of VoIP that uses the internet as a mode of transmission instead of PSTN (public switched telephone network) nowadays. According to an analysis made by analysts in the past few years, it has come into limelight that a proportion of 20 % of businesses in U.S. have brought VoIP into practice and this fraction is likely to accelerate in the upcoming years (Wallingford, 2005). In this modern era of breakthroughs, where VoIP has experienced a boom in the field of commerce, one of its prime examples...
2 Pages(500 words)Essay

VoIP Security Problem and Solution

The major benefit of this technology is that it reduces the expenditures that go together with a traditional phone line, at least at this point of the game. In other words, this is a new communication technology structure that offers the savings of hundreds, or yet thousands of dollars for a number of people. Additionally, the people who have made use of voice chat software would have knowledge of the latency concerns that transmit through some kind of data transfer including the internet. However, VoIP technology effectively deals with the latency concerns by means of RTP (real-time communication protocol). In addition, this communication protocol ensures that data packets are transferred and received in an appropriate manner (Ga...
5 Pages(1250 words)Essay


...Forensics in VoIP Services April 9, 2009 An introduction to VOIP and SIP VoIP is telephony which uses a packet switched network as against circuit switched networks. VoIP transmits packets of data between smart devices (e.g. computers) over a relatively unintelligent network, whereas traditional telephony sends voice data between dumb devices (telephones) through a super smart central network. The Session Initiation Protocol (SIP) is commonly used in VoIP implementations. It provides the ability to integrate traditional voice services with web-based data services, which include self-based provisioning,...
2 Pages(500 words)Research Proposal

Security Risks Associated With VoIP Implementation a combination of authentication and encryption. For this reason the best product to offer the two as a solution to eavesdropping is a Secure RTP. To protect against replay attacks, SIPS will be used (SIP over transport layer security). SIPS in this case is appropriate as it offers integrity as well as authentication to the user. The user is able to connect better with the Call Management Software. 3.7 How to test the security risks in the 250K company According to Endler and Collier (2007) near the end of 2006 VoIP services had their vulnerability increase and it is notable that this vulnerability since then has not dropped but rather increased. This...
17 Pages(4250 words)Research Paper

Internet protocol and VoIP security

...Introduction VoIP is one of the most important emerging trends in telecommunications and it integrates communication services into the IP network infrastructure. The aim of this work is to devvelop a methodology that will lead to a high level solution using MPLS (Multi protocol layer switch) for VPN as a new technique related to security. These new techniques will lay the foundation for solving the mentioned issues from a different angle, which is expected to improve the security and QoS of the existing approach.The paper will involve an understanding of the current security implications of VoIP, and to run...
15 Pages(3750 words)Essay

Security Service

...the imagination of future situations. The summary is then simple; the formation of the security service charged with the responsibility of prevention and preparation of future threats to security is as a result of imagination. This is clearly evidenced by this study. References Andrew, C (1987). Her Majesty's secret service Penguin Publisher. Knighteley, P (1986). The second oldest profession: Spies and spying in the twentieth century.WW Norton& Co Inc. French, David. (1978): "Spy Fever In Britain 1900-1915." Historical Journal 21 Nicholas Hiley (1990). Intelligence and National Security, Volume 5 Issue 4 1990, Routledge Publisher. Thompson, B...
10 Pages(2500 words)Essay

Quality of service for VoIP special VOIP components. Not only does VOIP need higher recital than mainly data systems, serious services. One of the major sources of bewilderment for those new to VOIP is the hypothesis that because digitized voice travels in packets just like further data, accessible network architectures and tools can be used with no change. Though, VOIP adds a number of complications to obtainable network technology, and these troubles are exaggerated by security thought (P. Mehta and S. Udani, 2004). Quality of Service (QoS) is basic to the process of a VOIP network that assembles users’ quality prospect....
14 Pages(3500 words)Dissertation

VOIP security (information technology)

...Running Head: VoIP Vulnerabilities VoIP Vulnerabilities of Introduction VoIP or Voice over Internet Protocolis the technology which carries voice communications over packet switched networks or the IP networks such as the Internet. But VoIP networks are weak and are vulnerable to attacks. In my paper I will discuss the five security concerns related to VoIP networks. The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack. Man in the Middle Attack VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of data, in this form of attack the attacker uses eavesdropping to make connections... with...
3 Pages(750 words)Essay


...). In addition, VoIP telephone calls can be done either to some other VoIP systems and devices, or to usual telephones on the Public Switched Telephone Network (PSTN). In this scenario, the calls from a VoIP device to a PSTN device are normally acknowledged as "PC-to-Phone" communication calls, however VoIP device may not be a PC. Additionally, calls from a VoIP system to another VoIP device are usually acknowledged as "PC-to-PC" calls, even neither device may be a PC (Tech-Faq, 2011). Moreover, the primary idea to switch to VoIP technology for telephone service is cost reduction. VoIP is...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Dissertation on topic Service and the Security implication of VOIP for FREE!

Contact Us