Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Threats and Methods to Secure a VoIP Network - Essay Example

Comments (0) Cite this document
Technology is a double-edged sword. The more conveniences and benefits we derive from latest developments, the more insecure we grow. VOIP is a fast growing technology, as it is very simple, cost effective and does not need any special equipment other than a computer and a phone line…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Threats and Methods to Secure a VoIP Network
Read TextPreview

Extract of sample "Threats and Methods to Secure a VoIP Network"

Download file to see previous pages People were mostly concerned with its cost, functionality and reliability. Today, VoIP is growing to the point where companies of almost any size in any industry know how to take advantage of the cost savings and other emerging added features in VoIP. As VOIP is gaining wide acceptance and becoming one of the mainstream communication technologies, security has become a major issue. Network Administrators are finding themselves in a tough position of providing their clienteles with the security and reliability that they have grown accustomed to over these years.
The threats to security and privacy could be in the form of DOS (denial of service), malformed messages, sniffing, spoofing, vishing, VOIP spam and SPIT (spam over VOIP). The vulnerable components under threat through the use of VoIP could be access device application, management interface, network, tftp server. Means to secure the VOIP network could be VoIP Protocol, Session Border Protocol, or using the network devices.
To protect networks from these threats, one of the key aspects is the methodology of securing information; that is, to conceal the signals and media in real time communications from unauthorized entities through cryptography. But there is no single solution to secure a VOIP service network entirely the best practice is to integrate all possible solutions according to service model, network architecture, protocol model, target customers, peering partners and so on.
With increasing use of this technology combined with modern technology and its users, VoIP faces many security issues that need to be covered and prevented in order to make this technology as one of the best for the companies. Therefore this dissertation will examine some security concerns and protection methods by analyzing the threats to VoIP network and consequently determine how to deal with them from design, quality of service and management perspectives.
1.2 Introduction
As with IT security, there are a multitude of threats to a VoIP network that can make it difficult to secure VoIP telephony. DoS attacks, message tampering, proxy impersonation, registration hijacking are but a few of the problems telephony managers may encounter as they try to secure VoIP networks.
The security of private data, whether in organizations or industries, is becoming more crucial and relevant each day. VOIP technology also needs to continually improve and update its security defenses in terms of reliability and quality. As internet telephony comes to handle more data, it becomes an easy target for cyber crime. From the beginning of its inception, VOIP infrastructure has always been vulnerable to threats from other networked architectures. This happens due to the process of digitization, and encryption of voice, which is then compressed into small packets and sent over the Internet Protocol network systems. This technicality is presented in the VOIP system which can ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Threats and Methods to Secure a VoIP Network Essay”, n.d.)
Threats and Methods to Secure a VoIP Network Essay. Retrieved from
(Threats and Methods to Secure a VoIP Network Essay)
Threats and Methods to Secure a VoIP Network Essay.
“Threats and Methods to Secure a VoIP Network Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Threats and Methods to Secure a VoIP Network

TCP/IP security threats and attack methods

.... However since Internet access is generally left unregulated therefore other methods of protection against such threats have been provided in this section. Until or unless extremely strong authentication and cryptography has been put in place all trust relationships should be banned including files such as the .rhosts as hosts communicating over the internet open a lot of doors towards attacks. Then again firewalls should be put in place which effectively monitor which IP datagrams have access to the internet. Internal source addresses should be kept within a network and away from the internet, and the outer source addresses should be kept away from the networks, vice versa. 2.1.4 Ping O’ Death The transmission of delivering an ICMP echo...
20 Pages(5000 words)Research Paper


...?Running Head: VoIP VoIP [Institute’s VoIP Over the past two decades, technology has revolutionized rapidly more than any otherfacet in this competitive world and thus, has left an indelible imprint on the entire planet. With the passage of time, technology is incessantly offering with a wide range of innovative, over-whelming products that have reformed human life. Internet, one of the marvels of technology, alters the voice signals into digital signals and then transmits them via IP-based networks or data network. This unprecedented advancement in telecommunication has come to known as VoIP (Voice over Internet Protocol). “IP telephony, Internet telephony, Voice over Broadband (VoBB), broadband telephony, and broadband phone are few...
2 Pages(500 words)Essay

Network security fundamentals, security threats, and issues

...?NETWORK SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES Network Security Fundamentals, Security Threats, and Issues Affiliation Date 3.1. Network Firewalls Security consists of tools, technologies, measures and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet. In view of the fact that the Internet is a huge network of networks, as well as for the reason that of its basic design is intrinsically insecure and unsafe. In addition, data and information (in the form of communication) are often distributed all...
4 Pages(1000 words)Case Study

Study of protocols in a VoIP network

These applications later came out with voice conversation features in which users utilize computer headsets or IP telephone handsets in communicating with one another. Services like call forwarding, conference calling, voicemail, contact management and directory assistance were later added and paved the way for the creation of a new revolutionary technology - Voice over Internet Protocol or VoIP. This development has captured the attention of telecom regulators and operators who have now started to embrace the technology as one of their mainstream services. The two most popular protocols, H.323 and SIP will be discussed in this report.
H.323 is a standard for the transmission of real-time audio, video, and data informatio...
16 Pages(4000 words)Essay


...Forensics in VoIP Services April 9, 2009 An introduction to VOIP and SIP VoIP is telephony which uses a packet switched network as against circuit switched networks. VoIP transmits packets of data between smart devices (e.g. computers) over a relatively unintelligent network, whereas traditional telephony sends voice data between dumb devices (telephones) through a super smart central network. The Session Initiation Protocol (SIP) is commonly used in VoIP implementations. It provides the ability to integrate traditional voice services with web-based data services, which include self-based provisioning, instant messaging, presence, and mobility services. It is used for call initiation, call teardown and other call related data sent during...
2 Pages(500 words)Research Proposal

Computer Network Security Methods

...Running head: A CRITICAL ANALYSIS OF COMPUTER NETWORK SECURITY METHODS A Critical Analysis of Computer Network Security Methods ------------------------------------- Abstract The paper presents a detailed overview of network security issues with critical examination of mechanisms and tools that have been developed to provide protection to networks. The paper brings out the network vulnerabilities, describing the types of probable attacks followed by the counter measures that can be adopted to safeguard against these attacks. All existing technical mechanisms like, cryptography, network security applications and network security systems, related to network security, are briefly explained (not physical measures). Finally...
24 Pages(6000 words)Essay

Network and computer intrusion threats

Security is a psychological impulse within ourselves so we feel comfortable and protected.  Security is the idea of something being in a location unable to be modified, stolen, damaged and or removed without permission.  According to the American Heritage Dictionary of English Language (2006) secure is a word describing freedom of danger, attack and risk of loss.  A sense of security has always been an element of the human infrastructure to protect what is theirs from outside intruders.  We can see this in the methods by which ancient people constructed their homes and the usage of fortifications in their villages, towns and cities. These ancient protections were an essential part of life, to live in safety...

39 Pages(9750 words)Essay


...). In addition, VoIP telephone calls can be done either to some other VoIP systems and devices, or to usual telephones on the Public Switched Telephone Network (PSTN). In this scenario, the calls from a VoIP device to a PSTN device are normally acknowledged as "PC-to-Phone" communication calls, however VoIP device may not be a PC. Additionally, calls from a VoIP system to another VoIP device are usually acknowledged as "PC-to-PC" calls, even neither device may be a PC (Tech-Faq, 2011). Moreover, the primary idea to switch to VoIP technology for telephone service is cost reduction. VoIP is becoming more and more famous for the reason that of price benefit to customers over customary telephone networks. In fact, VoIP cuts monthly phone bill...
2 Pages(500 words)Essay

How Secure Is the Internet When It Comes to Personal Data

Millions of computer users worldwide every year lose invaluable data and information at the hands of stolen means employed by anyone sitting on workstation thousands of miles away from the host node. Computer privacy is one such aspect on which the researchers in the same field are working their best. Certain ways are being devised all around the globe to ascertain the manner in which computer data can be kept secret from the people who are not authorized to seek it. Internet privacy of late has become a serious issue that should be tackled with immediate effect. There are many issues at stake with respect to computer privacy such as the authority to create standards regarding the usage of personal data on one’s machine as w...
6 Pages(1500 words)Term Paper

Opportunities, Quality of Service and Risks/Threats of VoIP

... cases can be considered too for VoIP, as it uses the same protocol as used by the internet. Also various threats that are related to internet will be applicable for VoIP network too. Some of the common threats are virus, Trojan horse, worm, denial of service attack or VoIP service Disruption, call hijacking and interception, ARP Spoofing, H.323-Specific attacks, and SIP-Specific attacks. All the parameters and security that are involved and used by data network and internet can be applicable for VoIP also. One major concern that is said for the VoIP is the quality of services that it provides. Now with the use of broadband connections by home users and dedicated lines used by the many organizations, this concern can be reduced very much...
16 Pages(4000 words)Research Proposal

A Comprehensive Network Infrastructure

All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company’s data. Both headquarters have an urge in establishing reliable and cost-effective printing solutions.
The purpose of the needs analysis is to analyze the business objectives and produce requirements for a network infrastructure to be used in the proposed network infrastructure solution. The proposed network infrastructure solution follows in Section 3.
The best type of connection between offices and points of sales for a geographically spread retail company is by using a broadband internet connection technology and implementing an outsourced virtual priv...
12 Pages(3000 words)Assignment

Critique of Statistical Methods for the Social Sciences Research by Agresti and Finlay

It was expected that the discussion would be about the costs associated with shrunken class size.  That it is impractical to decrease the number of students to 30 since it will not improve their academic proficiency, but would only increase costs.  Or if it does boost academic performance, it is too little to match the costs associated with that kind of class set-up. Simply stated, the cost of reducing class size to 30 is greater than the expected benefit. However, the proposal mainly dwelt on the ineffectiveness of reducing the class size, with no or minimal discussion on costs. The introduction creates a first impression on a written piece. That is why, short as it may be, the introduction should still brief and prepar...
6 Pages(1500 words)Assignment

Cultural History Versus Political History: The Varying Methods of the Two Fathers of History

Even though they have these similarities and have both been bestowed with the same title, these two historians drastically differed in their approaches.

Herodotus had another title bestowed upon him; he was also called the “Father of Lies.” Much of what is known of him has been gathered from his own writings as few other sources are available from his actual life. It should also be noted that the veracity of this information is in question as Herodotus was known to invent much in his own work, and it was sometimes the practice in Ancient Greece to attribute events from the life of one person to another; for instance, it has been questioned if the accounts of Herodotus’ exile are only due to the fact th...
10 Pages(2500 words)Essay

Effective Methods of Teaching Anatomy

Herein, comparisons will be made to highlight the differences in using anatomical models for study versus self-directed (usually textbook) learning. As well, the use of tutors as an advantage in the medical classroom will be discussed.

Some students are hands-on learners. For them, three-dimensional (3D) anatomical models are effective. “Exploratory tools enable users to investigate structures in ways not possible in the real world” (Implementing, para. 3). These 3D models can represent just about any part of the human body. Models are available of small structures, like the head, or of the entire human skeleton. Models of the entire human body can also be purchased. Some of them even have removable parts so...
6 Pages(1500 words)Report

Research Methods in Linguistics

 The writer of content tries to preserve his/her culture and also wants his/her culture to get attached to his/her recent living due to which, he/she makes use of the bilingual aspect to write a narrative.

Because of this writing, the English reader faces some problem in decoding the meaning but he/she realizes the presence of another culture by means of this writing. Many writers provide a glossary at the end so that the readers face no problem in decoding the words given in another language such as Soueif has done but many take it for granted that readers know the other language as well.

The article contains a detailed evaluation of the novel by Soueif which can be categorized as the strength of the re...
6 Pages(1500 words)Assignment

Analysis of the Methods of 3 Research Papers about Child Abuse

Research ethics was maintained as the identity of the individuals participating was kept secret. As far as the validity of the study was concerned, the researchers attempted to use content validity in order to get an accurate response. The content validity focused on measuring off the ethnicities and gender percentages within the area and attempting to get a random sample of individuals via the phone. Their approach to random calling allowed for a significant random sample in the study. There were a few issues, however, with this type of approach. Those answering the phone sometimes were not always the desired individual, and not all of the desired people were surveyed. Different replacements did have to be used, and the attempt w...
6 Pages(1500 words)Literature review

Using Computers to Teach Mathematics is Better than Traditional Methods

...Using computers to teach Mathematics is better than traditional methods Computer technology has changed the face of education, and is a useful tool in the teaching of other subjects as well with Mathematics being no exception. Various calculating devices have long been used in Mathematics, but the computer offers an even greater potential. Some teachers are reluctant to use computers, for example on the grounds that it is an expensive option and not every child has access to one at home, but its prevalence nowadays means that students should be given the opportunity to use computers in their Mathematics lessons. They have the advantage of being able to make complex calculations much quicker, demonstrate graphical visualisations, instilling...
7 Pages(1750 words)Case Study

Alternative Methods of Accounting

Accounting has always been a self-regulated profession. After the 2nd half of the 20th-century changes in accounting occurred due to the influence of private organizations such as the FASB.  In the United States, accountants followed the generally accepted accounting principles (GAAP) to guide their everyday work. Accounting is a discipline that is very strict in its ways and does not welcome change well. In the aftermath of the Enron and WorldCom scandal, the government had to force change with the creation of the Sarbanes Oxley Act of 2002 due to a lack of trust in financial information. 

The efficient market hypothesis states that securities are typically in equilibrium and that they are fairly priced in th...
8 Pages(2000 words)Article

Device Hardening and Secure Network Design

Bragg, Rhodes-Ousley, & Strassberg (2009) stated that routers have the capability to carry out IP packet check and filter. Access control lists (ACLs) could be configured to authorize or refute UDP and TCP network traffic. These factors are foundational upon the destination or source address, or together, and on the UDP or TCP port numbers enclosed in a packet. Additionally, the firewalls are implemented for additional in-depth examination; tactically positioned router ACLs thus they augment network security. For instance, access control lists could be employed on border routers to drop visibly not needed traffic, eliminating the burden from the border firewalls. Access control lists can as well be employed on WAN links to dro...
12 Pages(3000 words)Term Paper

The Impact of Social Network in Tourism

Earlier travelers used to be dependent on travel agencies, their suggestions, and advice while planning any trip. However, over time individual traveling is gaining popularity. People have become more internet savvy nowadays and they are using various online information sources like official websites of travel companies, blogs, social networking sites, etc. to make their decision regarding any future travel. A number of studies have tried to find out how social networking is used by travelers as well as travel companies in this tourism market. Travel agencies are also increasingly realizing the need for promoting their services through social networking sites as members of various social networking sites are increasing significant...
41 Pages(10250 words)Thesis
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Threats and Methods to Secure a VoIP Network for FREE!

Contact Us