VoIP Security
Computers & Technology → Technology
- Author Peter Nisbet
- Published September 19, 2006
- Word count 671
VoIP security has been called in question recently, though there is little evidence to indicate that VoIP security is any less than conventional telephony systems.
VoIP voice data is transmitted via a packet-switched data network using IP. VoIP systems can carry a significant higher number of calls, and very much faster, than traditional PSTN networks due to compression of the voice packets, modern broadband technology and a number of other gateway developments which have reduced the previous packet delivery problems to an extent that the protocol is now a viable mainstream telephony solution to most business needs.
VoIP security should therefore be shown to be at least as effective as that of traditional telephone systems.
There is actually very little difference between VoIP security and that required for any other type of data transmission system. Look on it the same as you do your email system. The same as your office LAN if you have one. You probably have a system in operation whereby only authorized personnel can use certain aspects of the network. VoIP security can, and do, use the same techniques.
However, having said that, let’s have a look at potential weak points in VoIP security that budding hackers may see as good points of attack.
IP PBX CALL MANAGEMENT BOXES
PBX stands for Private Branch Exchange, and is piece of software running on a server. It’s function is to deal with all the switches and connections involved in the telephone system. These can be attacked by hackers or viruses which could compromise sensitive data. VoIP security systems are designed with this risk in mind.
PBX equipment should be placed behind firewalls, locked down and regularly monitored for unwarranted intrusions using intrusion-detection software. It is also possible to put the server in a different domain from the rest of the system, making it much more difficult for intruders to reach. PBX security is a basic aspect of VoIP security systems
GATEWAYS AND DATA PACKETS
The gateway’s job is to convert voice to data packets, transmit them then receive and convert the packets back into voice. These are a potential VoIP security risk in that thy can be hacked into unless there is an access-control system in place to prevent unauthorized people from accessing the system. VoIP calls should only be permitted to specific people, and most good VoIP security systems allow only authorized user to operate VoIP systems under password control.
The data packets themselves can be hacked into using data-sniffing techniques. This can be a serious VoIP security risk and packet sniffers, as they are often called, capture binary data passing through your network and can reroute it to a computer on another network for decoding into a readable form. In order to do this, the ‘sniffers’ has to be on the same network wire as the packet is using to reach its destination. The problem in installing an effective VoIP security system is that there is usually a lot of information passing at any one time, and the hacker has a higher probability of getting useful information than from a conventional telephone system.
Encrypting VoIP traffic and routing it through a virtual private network would reduce the VoIP security risk, and most corporate systems have multiple encryption layers for external messages. Internal security could be improved by running internal VoIP messages through this corporate network. Small businesses should seek the advice of their supplier, or of a security expert if they feel that they may be subject to such attacks.
However, VoIP security advisors can point small to medium companies in the right direction. Corporate VoIP security is generally not so much problem in that it is normally contracted out to expert advisers.
In the final analysis, however, there are no real differences between VoIP security and the normal security concerns associated with any data network service, such as normal office internet and email LANs. The security firewalls and restricted access to use, common on these systems, should suffice to deal with VoIP security
Peter is an industrial research chemist with almost a fixation with data transfer systems, starting with audio and video file formats and codecs, and here with telephonic transmission systems which allow what is commonly known as VoIP. His fascination with subject is obvious from his website: http://www.data-voip-solutions.com
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- 10 Tips to Maximize Efficiency in Business Central with Maintenance Manager
- Reaching For The Skies! CNC Machining In Aerospace
- AI-Powered Content Generators: What Are the Opportunities and Challenges?
- Xcode Development services: Riding the Wave of Innovation
- Top 10 Ways Product Configurator Simplifies Manufacturing in Business Central
- One-Way Interviews: A Game-Changer in Modern Hiring
- The Rise Of Quantum Computing: What It Means For Businesses
- Top Six Ways the Enhanced Planning Pack Streamlines Operations in Business Central
- Why You Should Consider Building a Website
- The Transformation of Software Distribution: The Benefits of Selling Digital Licenses
- Round Robin Lead Distribution and Assignment: A Game-Changer for Sales Teams
- Why You Need DRaaS: The Case for MedOne’s Disaster Recovery as a Service
- Blockchain Wallets and Their Integration with Browsers
- Top 10 Ways Maintenance Manager for Business Central Saves Asset Headaches
- Optimizing Your Business with Accounting Workflow Management Software
- IBM: A company that does remarkable things!
- Top Emerging Trends in Quantum Computing for 2024 and Beyond
- How Much Does a Gaming Computer Cost? A Comprehensive Guide for Gamers
- The Future of IT Support: Empowering Businesses in a Digital World
- 10 Ways to Transform Production Scheduling in Business Central
- Grow Your Taxi Business with a Modern Taxi Dispatch System
- Master the Art of Gamification with Our Engaging App
- 10 Reasons Business Central Users Leverage Advanced Inventory Count
- The Ultimate Guide to 3D Animation: From Basics to Advanced Techniques
- Are Computer Towers Better Than Laptops? The Ultimate Comparison Guide for 2025
- Top 10 Software Company in Bangladesh
- Mitsubishi Electric proves heat pump compatibility with microbore pipework
- The Role of AI Services in Customer Experience and Satisfaction
- Google DeepMind Launches Gemma 2: A New AI Model Revolutionizing Research and Development
- How Do AI Solutions Drive Productivity And ROI In Business?