.

Sunday, February 17, 2019

VoIP: A New Frontier for Security and Vulnerabilities Essay -- essays

VoIP A New confines for Security and VulnerabilitiesIntroduction to Voice oer IP TechnologyThe compact of extremely cheap telephone receipts, utilizing the Internet to transmit give tongue to, has made voice over IP an attractive and profitable idea. Vonage (http//www.vonage.com/) and other service providers coax consumers by charging a flat, monthly rate for unlimited long outstrip in the U.S. and Canada the rate is often less than it would cost for a incessant phone line without any long distance charges. An entity with an enormous retrieve volume, such as a worldwide retail corporation, could benefit from horrible cost savings by transitioning all of its telephony networks to VoIP.Voice over IP uses a innkeeper to ascribe all telephones in a local bea network and act as a gate for VoIP packets traveling to and from the Internet. Consumers with broadband internet connections can purchase VoIP handsets or routers with an RJ-11 zany to connect regular telephones. Busin esses must implement a VoIP application server to handle corporate telephone use, much like mail servers are used to manage email. The Internet Protocol Private Branch re-sentencing (IP PBX) is telephone equipment used by private companies, rather than telephone service providers, for the management of VoIP calls placed on the data network. When considering VoIP, organizations should focus on indispensable quality of service (QoS) requirements, the cost to implement, and a number of security precautions demand to protect the network (Mullins, 2005).ProtocolsThe two most common protocols central to VoIP are Session Initiation Protocol (SIP) and H.323. Both also rely on a number of other protocols, such as DNS and ENUM, in enjoin to locate and navigate to other hosts on the Internet.SIP first uses each TCP or UDP to signal a host on behavior 5060 then the Real-Time Transport Protocol (RTP) is used to transmit an sound recording stream over UDP ports 16384 through 32767 (Mullin s, 2005). It is a broader specification, generally used to connect network devices to servers or other kinds of control equipment. SIP supports user credentials and the transmission of any type of media, including audio, video, and messaging.On the other hand, H.323 is a composition more complex, deri... ....org/columns/futuretense/2005/03/08.shtml.Hall, M. (2005, adjoin 21). SIP tips VoIP into secure. Computerworld. Retrieved adjoin 24, 2005 from the public all-embracing sack up http//www.computerworld.com/printthis/2005/0,4814,100497,00.htmlKorzeniowski, P. (2005, February 16). Why VoIP is raising new security concerns. IT Managers Journal. Retrieved defect 24, 2005 from the World Wide Web http//software.itmanagersjournal.com/print.pl?sid=05/02/11/0028208.McArdle, D. (2005, February 18). Group tackles VoIP security fears. ElectricNews.Net. Retrieved March 24, 2005 from the World Wide Web http//www.enn.ie/print.html?code=9589191.Mullins, M. (2005, November 3). Doing the Vo IP security groundwork. CNETAsia. Retrieved March 24, 2005 from the World Wide Web http//asia.cnet.com.Rendon, J. (2004, December 8). The security risks of VoIP. CIO News. Retrieved March 24, 2005 from the World Wide Web http//searchcio.techtarget.com/originalContent/0,289142,sid19_gci1032194,00.html.Sullivan, A. (2005, March 21). Scam artists dial for dollars on Internet phones. Computerworld. Retrieved March 24, 2005 from the World Wide Web http//www.computerworld.com/printthis/2005/0,4814,100549,00.html.

No comments:

Post a Comment