StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Risks Associated With VoIP Implementation - Research Paper Example

Cite this document
Summary
This paper discussed the security risks that are associated with VoIP implementation. The paper has been divided into four chapters. Chapter 1 will cover the statement of the problem, situational analysis, definitions, limitations, delimitations and the introduction…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Security Risks Associated With VoIP Implementation
Read Text Preview

Extract of sample "Security Risks Associated With VoIP Implementation"

Download file to see previous pages

Part 2 gives detailed descriptions of the testing or test cases. Part 3 discusses groups that will be affected by the tests. Part 4 discusses those who will be involved with testing. Part 5 discusses how results will be assessed. Part 6 gives the changes that will be made as a result of the testing. Part 7 discusses how to test the security risks in the 250K company. Chapter 4 gives the summary, findings, conclusions and recommendations. Many businesses internationally have applied Voice over Internet Protocol (VoIP) as a substitute for the traditional Plain Old Telephone System (POTS) as stated by Ransome and Rittinghouse (2005, pp. 278-302). The improvement of VoIP offers a wide range of advantages ranging from saving of cost, efficiency in staff operations to offering improved shopping encounter for customers.

These benefits go a long way in enhancing a business' competence and offers market leadership and dominance. Business management may be able to expand its competitive advantage by making use of the benefits that VoIP offers while considering some risks that should be dealt with by giving remedies and avoiding them altogether. The management of these risks is in the end the onus of the company management. These risks may range from compromising of high quality delivery, controlling of expenses that are security related to call hijacking among others.

It is important to appreciate here that these risks offer huge drawbacks to business performance and their mitigation is a key factor that requires a great deal of management's attention. The paper is aimed at providing management with insight into what the risks of VoIP are. 1.2 Situational analysisIn business, it is the task of the management to deploy, coordinate, allocate and combine inputs or resources in such a way that the goals of the organization are achieved as effectively as possible (Wallingford, 2005, pp. 245-263). In a business these resources are categorized into information, physical, human and financial resources.

The former is quickly becoming one of the most important of the resources. The information resource consists of organized or processed data. The value of the information resource can also play a role in providing a business with a significant competitive advantage. Businesses are currently operating in the information era, wherein quality of information can establish the difference between successful and unsuccessful ventures. The factors that contribute to the quality of information have consequently become increasingly important.

Completeness, timeliness, relevance and accuracy are, among other things, attributes of good quality information. Good quality information is communicated to the appropriate users before it is regarded as useful or valuable. Communication is the manner in which information is made accessible to other users, whereas telecommunications is the digital transmission of data or information from one terminal to another in terms of function and sophistication (Wallingford, 2005, pp. 245-263). Basic ways of communication include the use of telephones and fax.

According to Wallingford (2005, pp. 245-263) the machines used in communication vary, whereby more technologically advanced and newer methods of communication

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Risks Associated With VoIP Implementation Research Paper”, n.d.)
Security Risks Associated With VoIP Implementation Research Paper. Retrieved from https://studentshare.org/miscellaneous/1508602-security-risks-associated-with-voip-implementation
(Security Risks Associated With VoIP Implementation Research Paper)
Security Risks Associated With VoIP Implementation Research Paper. https://studentshare.org/miscellaneous/1508602-security-risks-associated-with-voip-implementation.
“Security Risks Associated With VoIP Implementation Research Paper”, n.d. https://studentshare.org/miscellaneous/1508602-security-risks-associated-with-voip-implementation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Risks Associated With VoIP Implementation

Internet Security and Its Impact on Electronic Business Design

As the dependence on the Internet increases, so do the pertinent risks that might hamper the profitability of a business due to computer criminals.... The past few years have revealed that most people are not proactive towards Internet security and tend to wake up to its importance only after the disaster has already struck.... This paper aims at analysing the impact Internet security has on electronic business.... The prevalent norms of electronic business are analysed and the security mandated are considered....
9 Pages (2250 words) Essay

Security Managers Should Be Managers First And Security Specialist Second

hrough the reporting procedure, business managers take responsibility for either tolerating or mitigating security risks associated with their operations.... Managing the increased risks associated with a highly interconnected computing environment demands increased central coordination to ensure that weaknesses in one organizational unit's systems do not place the entire organization's information assets at undue risk.... Security managers' extensive scope of responsibilities require a trivial task - from risk assessment to the implementation of security policies, from human resource issues to the definition of security duties, including global exposure, and strategic planning, must be embraced and managed....
14 Pages (3500 words) Essay

The Development Information Security

hellip; security risks for large, small or medium enterprises are alike.... This essay describes increasing trend of digitized information, globalization of markets and resources has accelerated the incident of data loss and security issues.... Consequently, this ever-increasing security threat has led to the development of numerous information security standards.... For SMEs, there is an increased need for security framework in order to ensure a reliable and secure IT infrastructure....
25 Pages (6250 words) Essay

Voice over Internet Protocol: Security, Vulnerabilities and Recommendations

Information security, software vulnerabilities, and social engineering will be briefly discussed followed by an in-depth exploration of vulnerabilities associated with the use of VoIP.... voip systems are not immune to these, and it is essential that software and social security measures be taken.... Software controls include voip specific measures listed as well as general Internet security software.... Important voip communications should be encrypted Besides software, social control measures have also been discussed, which are just as important as deploying software controls due to human vulnerabilities....
8 Pages (2000 words) Research Paper

Information Security: Law and Policy

Organizations need information security policies in order to eradicate or minimize any looming risks associated with the use of information.... In information security, regulation involves coming up or devising enforcement security control mechanisms aimed at minimizing or reducing risks associated with the use of information.... They also aim at eliminating any disagreement or violations which might be associated with the use of information....
4 Pages (1000 words) Case Study

Promoting Information Security in Banking Solutions Inc

This case study "Promoting Information security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... ther failures contributing to information security issues include problems regarding critical systems, business processes, alternative processing facility address as well as directions, notification listing, and procedures for public relations management....
5 Pages (1250 words) Case Study

The Strategies Applied in Computer Security

The review of the organizational risks and the implementation of security measures, should be done frequently to effectively support the changes for instance; the growth of the business.... This enables the identification of risks faced as well as the consequences of losing data due to system crash, theft cases and malware infection.... ecuring the dataThis is done the planning and assessment of the risks is complete and it involves the use of a system for data security....
8 Pages (2000 words) Assignment

Voluntary Principles on Security and Human Rights

They should be embedded towards a certain company culture, in terms of health and safety, since the risks associated with the risks are great, in terms of stock price, legal liability and reputation.... Nevertheless, they are genuinely filling up a crucial void for some companies who seek guidance on how to manage some of the potential risks that are related to their human rights and security practices, especially, those countries which are associated with alleged abuses or conflicts....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us