We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

VOIP security (information technology) - Essay Example

Comments (0)
VoIP or Voice over Internet Protocol is the technology which carries voice communications over packet switched networks or the IP networks such as the Internet. But VoIP networks are weak and are vulnerable to attacks. In my paper I will discuss the five security concerns…
Download full paper
VOIP security (information technology)
Read TextPreview

Extract of sample
VOIP security (information technology)

Download file to see previous pages... In most of the cases the people don’t know that someone is between them and they believe that they are talking in a secure private network. (Ransome & John W, 2005) The attacker controls the entire conversation and intercepts all the messages then injects new ones. This the reason that we should not give any personal information to each other using VoIP networks because it is vulnerable to man in the middle attack.
VoIP networks are also vulnerable to Phreaking attacks. Phreaking is the subculture activity of people we study and then experiment with telecommunication systems such as the public telephone systems. Today when telephone systems have become computerized this word is closely related to computer hacking. (Endler & Mark D, 2007) In a VoIP network the hackers alters different frequencies to get hold of the call. The attackers can manipulate the entire phone system. The use of Phreaking began when automatic switches were used in the telephone systems.
VoIP networks are also vulnerable to vishing. It’s another term for VoIP Phishing. It is basically a criminal practice which uses social engineering over a telephone network. It can use the features used by VoIP networks to gain access to personal information of anyone for the purpose of reward. (Porter, 2006) The attacker makes a call and pretends to be a representative of a trust worthy organization such as your bank to gain access to your personal bank details. To avoid this kind of attack you should never give any private or confidential information through a telephone network. This is the reason that trusted companies like PayPal and other banks never ask for your personal information through emails and automated phone calls. (Porter, 2006)
VoIP Spam is the repeated dialing of unwanted pre recorded phone calls with the help of VoIP features. This attack is ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
E-commerce: VOIP Security
Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval. The use of cryptography in this case tries to prevent eavesdropping by unwelcome parties.Even with the use of cryptography to protect calls; hijacking of calls also proves to be a major threat.
18 Pages(4500 words)Essay
Multimedia Networking - VoIP (Communications and Networks)
In addition, IP-PBX is particularly useful for carrying out various business activities or enterprises that require upholding continuous communication link with business associates as well as customers that are remotely connected to the business. Thus, IP-PBX is a system to supervise and manage a corporation all through the globe.
10 Pages(2500 words)Essay
VoIP Security Problem and Solution
The author states that the major benefit of this technology is that it reduces the expenditures that go together with a traditional phone line, at least at this point in the game. In other words, this is a new communication technology structure that offers the savings of hundreds, or yet thousands of dollars for a number of people.
5 Pages(1250 words)Essay
Technology of Information Security
The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world.
3 Pages(750 words)Essay
Information Technology Security
The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to unauthorized parties (Feruza and Kim 2007, pp.19).
3 Pages(750 words)Essay
Internet protocol and VoIP security
These new techniques will lay the foundation for solving the mentioned issues from a different angle, which is expected to improve the security and QoS of the existing approach.The paper will involve an understanding of the current security implications of VoIP, and to run VoIP in a safe, secure manner.
15 Pages(3750 words)Essay
Threats and Methods to Secure a VoIP Network
According to the Consultant practice IDC, VOIP represented in 2002 a market of 2.3 billions dollars, and according to Idate in 2010, 70% of the phone line in business world will be running on IP port. Like with any new technology, in the early days of VOIP, there were no serious concerns about security related to its use.
17 Pages(4250 words)Essay
How does technology make money
n of this paper deals with such an evolving technology called MOST (Media Oriented Systems Transport) which is a high speed multimedia network to access multimedia devices on demand as stated in MOST.com (2008). The second technology in discussion is VOIP. The Voice over
6 Pages(1500 words)Essay
Information Technology Security
Technology is shaping our world. It has become a part of everyone’s lives and it rules almost every action of ours. However, every new development has some merits and demerits. In this essay we
15 Pages(3750 words)Essay
Technology of Information Security
On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own computer. However, the most commonly used scenarios
2 Pages(500 words)Essay
Let us find you another Essay on topic VOIP security (information technology) for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us