StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Voice over Internet Protocol: Security, Vulnerabilities and Recommendations - Research Paper Example

Comments (0) Cite this document
Summary
The author states that an organization’s network connectivity poses numerous risks. VoIP systems are not immune to these, and it is essential that software and social security measures be taken. Software controls include VoIP specific measures listed as well as general Internet security software.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Voice over Internet Protocol: Security, Vulnerabilities and Recommendations
Read Text Preview

Extract of sample "Voice over Internet Protocol: Security, Vulnerabilities and Recommendations"

Download file to see previous pages Software controls try to prevent the exploitation of vulnerabilities but not all attacks can be contained by technical measures. Many vulnerabilities are due to “poorly designed implementations that can provide inroads to data networks. ‘Mistakes’ such as remaining undocumented open ports, extraneous services, etc. can be easily exploited, and denial of service attacks is the most significant specific threat to VoIP.

Computers and networks are an important part of the information systems of many organizations. We are dependent on computers and networks for the provision of services across all sectors of the economy. However, vulnerabilities exist in these information systems. Vulnerabilities in operating systems and application software can be exploited by cybercriminals. Social engineering provides an alternative method for attackers to gain access to information assets, through exploiting human vulnerabilities.

Open access and networking of computers increase risks and therefore require greater measures of security. Security is both a technical and social concern. It relates to the confidentiality of information, system integrity, authentication of users, personal safety of people and other social issues. Information security, software vulnerabilities, and social engineering will be briefly discussed followed by an in-depth exploration of vulnerabilities associated with the use of VoIP. Included are details of how vulnerabilities work, the consequences of an attack, and a look at possible controls. Recommendations are then offered that organizations can take to protect themselves.

Information that is confidential must not be accessible by unauthorized parties (Kinkus, 2002). And, there must also be protected against unauthorized changes, which is known as integrity. Unauthorized access is a leak of information that could be mildly embarrassing in the case of personal information to outright disastrous in the case of sensitive information. Hacking compromises both the confidentiality and integrity of information.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Voice over Internet Protocol: Security, Vulnerabilities and Research Paper, n.d.)
Voice over Internet Protocol: Security, Vulnerabilities and Research Paper. Retrieved from https://studentshare.org/information-technology/1724586-voice-over-internet-protocol-voip
(Voice over Internet Protocol: Security, Vulnerabilities and Research Paper)
Voice over Internet Protocol: Security, Vulnerabilities and Research Paper. https://studentshare.org/information-technology/1724586-voice-over-internet-protocol-voip.
“Voice over Internet Protocol: Security, Vulnerabilities and Research Paper”. https://studentshare.org/information-technology/1724586-voice-over-internet-protocol-voip.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Voice over Internet Protocol: Security, Vulnerabilities and Recommendations

Voice over Internet Protocol (VOIP) Basics

...?VOICE OVER INTERNET PROTOCOL Voice over Internet Protocol Affiliation Table of Contents TECHNOLOGY EVOLUTION 4 HOW VOIP TECHNOLOGY IS BETTER? 5 MAJOR FEATURES OF VOIP 6 THE USES OF VIOP 7 THE ECONOMICS OF VOIP 7 HOW DOES VOIP TECHNOLOGY WORK? 8 DISADVANTAGES OF VOIP 9 FUTURE OF VOIP 11 CONCLUSION 12 REFERENCES 13 INTRODUCTION Voice over Internet Protocol (VoIP) is a well known buzzword nowadays. It is a new technology based communication or way of talking over the phone just round the corner. The main advantage of this technology is that it minimizes the costs that come with a customary phone line, as a minimum at this point of the game. Additionally, this is new communication technology framework that offers the savings of hundreds...
10 Pages (2500 words) Research Paper

Voice over Internet Protocol Security Vulnerability and Risk Analysis

...?Voice over Internet Protocol Security vulnerability and Risk Analysis: The journey of communication has undergone number of steps and overperiod of time all those means have offered more compared to their predecessors. The late 20th century was seen as the time period where rapid development took place in the world of telecommunications. In modern times different means and mechanisms are being introduced for establishing communication with one another. The aim behind all of them has been to work on those lines that ensure reliable, fast and economical sources that can enable connecting people from across the borders and shores. The progress so made is so immense that people sitting across the continent can get in touch and see each other...
4 Pages (1000 words) Literature review

Voice over Internet Protocol

...?VOICE OVER INTERNET PROTOCOL (VOIP) Voice over Internet Protocol (VoIP) Affiliation Table of Contents 1- Company Background 42- PROBLEM SOLUTION 4 3- SUMMARY OF TECHNOLOGY/PROPOSED SOLUTION 6 4- NETWORK DIAGRAM 6 5- TECHNICAL SPECIFICATIONS 8 5.1- Soft Solution 8 5.1.1- Purchased IP PBX (Private branch exchange) 8 5.1.2- Managed IP PBX (Private branch exchange) 9 5.1.3- Hosted IP Telephony / Hosted PBX 9 5.1.4- Recommendations 10 5.2- Network Equipment Specifications 10 5.2.1- Wireless Gateway  10 5.2.2- WLAN Controllers 11 5.2.3- Access Points and Ports 11 5.2.4- Protocols Used For the Routers at Each Location 11 6- FEASIBILITY STUDY 11 7- Operations Plan 13 8- TECHNOLOGY CONSIDERATIONS 14 9- CONCLUSION 14 10- REFERENCES 15 1...
10 Pages (2500 words) Research Paper

Telephony Application and VoIP (voice over Internet Protocol

...? of Derby School of Computing and Mathematics A project completed as part of the requirements for the BSs (Hons) Computer Forensic Investigation Entitled Resolution to the Security vulnerabilities Facing voice Over Internet Protocol Users By Abdullah Alaydarous In the years 2010-2013 Abstract This paper surveys literature on VoIP or voice over internet protocol telephony application. Since the inception of VoIP, it is possible to transfer voice, fax and video information for long distances over the internet. Given the new service applications available from VoIP and the expanding capacity for international commerce, operators using traditional public switched telephone networks are switching to internet protocol centric networks to remain...
21 Pages (5250 words) Dissertation

Internet protocol and VoIP security

... areas suitable for further development. VoIP (Voice over Internet Protocol) in simple words would be transmission of voice signal over internet such as SIP and H.323. There are a lots of other protocols which are used in VoIP technology such as UDP etc., but I think the most important of all would be SIP. This is because SIP is used by VoIP for establishing and terminating a session. So as we said SIP handles the setup, modification and responsible for ending a session between two terminals, these can be transmitted over internet using either UDP or TCP.H.323 is the standard for using audio-video protocol over the internet. It comes recommended by ITU (International Telecommunications Union). http://www.itu.int/net/home/index.aspx . VoIP...
15 Pages (3750 words) Essay

Quality of Service of Voice over Internet Protocol

...Quality of Service of Voice over Internet Protocol Technology has brought about many changes in almost all spheres of life. Information technology in particular has proved to be a great influence towards transforming the way we communicate, listen to radio broadcasts, watch television broadcasts, impart education, search for information, track the movement of processes and services etc. The digital revolution starting off from analog to digital conversion has provided plenty of opportunities to the communication and broadcasting industry with the development of Internet Protocol (IP). Services like IPTV, Voice over IP (VoIP), Video on Demand services etc. are providing opportunities to retailers in the industry to take on the traditional...
8 Pages (2000 words) Coursework

What I Have Learnt about Voice over Internet Protocol

In order to configure an IP address, needs to go to the control panel. The network option is chosen. The local area network to be configured is selected and the Internet Protocal Version 4 (TCP/IPv4) is selected. The properties option is selected for modification. The following screenshots show how the properties of the IP address were entered for connections one and two:
Local Connection 1
Local Connection 2
What I have learnt about VoIP
Interconnected VoIP services also allow one to make and receive calls to and from traditional landline numbers at no fee. Desantis (2008) notes that some VoIP services require the use of dedicated VoIP phones or computers, while others allow an individual to use landline phone...
2 Pages (500 words) Coursework

Password Management Protocol vulnerabilities

...Password Management Protocol vulnerabilities By of the affiliation Department’s Paper’s Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information. Such information should be protected and passwords are quite good solution for the protecting it from the unauthorized access. However, hackers can find them and steal using some software. There are many, even in the Internet, software which can help even amateurs in this business to steal passwords. We will through the usage of one application that can show and copy passwords saved in the browser. Many users use autocompleting in their browser and this main threat for the password security and we...
2 Pages (500 words) Essay

The Development of the Internet Protocol Security

...Introduction With the rise of internet and increased use of technology it became more difficult for the organizations as well as for individuals to maintain their privacy and secure their data. Since the utility of internet is increasing consistently, it is becoming increasingly important for the organizations to develop and maintain certain protocols that can help organizations to maintain the secrecy of important information such credit card information, customer data, financial transactions etc. Internet protocol is a protocol which is used to make communication between networks with the help of internet protocol suites. Communication across the various networks therefore become more secure and data transmission takes place...
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Voice over Internet Protocol: Security, Vulnerabilities and Recommendations for FREE!

Contact Us