Vo Ip: A New Frontier For Security And Vulnerabilities

2668 words - 11 pages

VoIP: A New Frontier for Security and Vulnerabilities

Introduction to Voice over IP Technology
     The promise of extremely cheap telephone service, utilizing the Internet to transmit voice, has made voice over IP an attractive and profitable idea. Vonage (http://www.vonage.com/) and other service providers entice consumers by charging a flat, monthly rate for unlimited long distance in the U.S. and Canada; the rate is often less than it would cost for a regular phone line without any long distance charges. An entity with an enormous call volume, such as a worldwide retail corporation, could benefit from tremendous cost savings by transitioning all of its telephony networks to VoIP.
     Voice over IP uses a server to connect all telephones in a local area network and act as a gateway for VoIP packets traveling to and from the Internet. Consumers with broadband internet connections can purchase VoIP handsets or routers with an RJ-11 jack to connect regular telephones. Businesses must implement a VoIP application server to handle corporate telephone use, much like mail servers are used to manage email. The Internet Protocol Private Branch eXchange (IP PBX) is telephone equipment used by private companies, rather than telephone service providers, for the management of VoIP calls placed on the data network. When considering VoIP, organizations should focus on necessary quality of service (QoS) requirements, the cost to implement, and a number of security precautions needed to protect the network (Mullins, 2005).
     The two most common protocols central to VoIP are Session Initiation Protocol (SIP) and H.323. Both also rely on a number of other protocols, such as DNS and ENUM, in order to locate and navigate to other hosts on the Internet.
     SIP first uses either TCP or UDP to signal a host on port 5060; then the Real-Time Transport Protocol (RTP) is used to transmit an audio stream over UDP ports 16384 through 32767 (Mullins, 2005). It is a broader specification, generally used to connect network devices to servers or other kinds of control equipment. SIP supports user authentication and the transmission of any type of media, including audio, video, and messaging.
     On the other hand, H.323 is a bit more complex, deriving much of its design from legacy communication systems. Some would argue that it is also better, having already experienced and solved communication problems in the past. H.323 utilizes unicast and multicast on UDP port 1718 to locate the gateway; then remote access service (RAS) is started on UDP port 1719. H.225 and H.245 are also used for call signaling over TCP port 1720 and data transmission over TCP ports 1000 through 65535 (Mullins, 2005).

Security Concerns
     As with any new technology of the Information Age which has had groundbreaking implications for...

Find Another Essay On VoIP: A New Frontier for Security and Vulnerabilities

Writing and Reading for a New Generation

1780 words - 7 pages “Writing and Reading for a New Generation” In the past decade, the Internet has taken over. Everyone from young children to senior citizens can communicate, send e-mail, or look up any bit of information in seconds. Because of the overwhelming shift to Internet technology and communication, many aspects of writing have been forever changed. Writers often write differently for the Internet than they do for a physical publication. Readers

A New Ending for Romeo And Juliet

869 words - 3 pages New Ending Act V, Scene III Verona. A churchyard; the monument of the Capulets. Enter Romeo and Paris. Paris This is that banished haughty Montague, That murdered my love’s cousin, with which grief It is supposed that fair creature died, And here is come to do some villainous shame To the dead bodies. I will apprehend him. Stop thy unhallowed toil vile Montague. Can vengance be pursued further than death? Condemned villian, I do apprehend

Productive Efficiency and In Efficiency of a Production Possibility Frontier

1408 words - 6 pages frontier. The government barely assumes that in that particular situation ecological calamities, natural disasters and military intrusion will not happen. The assumption is usually that even if these calamities do happen they cannot negatively affect the production possibility frontier (PPF) in any way. Other assumptions that are made include land level being held constant among others (Thompson 1985). A good example is shown below. For example, if we

Why Was There Opposition To Kennedy's 'New Frontier' And Johnson's 'Great Society'?

616 words - 2 pages President Kennedy’s ‘New Frontier’ and President Johnson’s ‘Great Society’ both proposed major changes to the USA under economic, social and civil rights issues. However, because some of the changes were so radical, the programs faced considerable opposition from a variety of groups and this had an effect on their success. Kennedy and Johnson both faced individual opposition to their policies. However Kennedy

Penetration Testing after a New Security System is Implemented

1322 words - 6 pages testing was proposed by Ciampa, Visaggio, and Di Penta in 2010. Their paper dealt specifically with testing against SQL injection, and compared the performance of an established tool, to the performance of a new tool that they propose using in the future. Ciampa, Visaggio, and Di Penta recognized that the most wide spread and dangerous web vulnerability at this time is SQL injection. While a tool for testing SQL injection vulnerabilities existed, the

Colonists and Indians Fight for Mutual Interests on the American Frontier

2312 words - 9 pages American culture and its development has to include mythology, because that is where most of the information about early America is found. Mythology is a unique source in that it gives a shared understanding that people have with regard to some aspect of their world. The most important experience for American frontiersmen is the challenge to the “myth of the frontier” that they believed in – “the conception of America as a wide-open land of

A High Security System For Databases

1855 words - 7 pages in disksand tapes second factor is the increasing demand for access to applications. The services are nowrequired literally around the clock. A third factor is that systems are changing all the time, withnew applications, major enhancements to .existing applications, and new technology. Finally thedatabase systems face continuo us intentional or unintentional security threats.Each of these factors directly involve or impact movements of huge

Room for a Cosmopolitan Future: Habermas and the New Order

1270 words - 6 pages based on more than the inherent irregularities present in transnational relations or a common commitment to the notion of ‘Human Rights’. He suggests that this new order, the cosmopolitan law, would need to have a coercive capacity for binding governments, without making reference to any notional standard of nationalism, in order to protect individuals as legally free and equal citizens of the world. This, he advises, could be achieved through

A Troubled Future for America: Health Care and Social Security Reform

1087 words - 4 pages An analysis of a book entitled The Radical Center by Ted Halstead and Michael Lind. Authors are founders of the New America Foundation, one of the nation's most successful new public policy think tanks. Discusses chapter two of the book.(The Radical Center by Ted Halstead and Michael Lind. Published by Doubleday, a division of Random House, New York, NY. 2001.)A Troubled Future for AmericaModern America is an ever changing society. Solutions to

A New Framework for Counterterrorism

1575 words - 6 pages how terrorist organizations are adapting to the tactics. With a new type of war against terrorism, there is a greater need to gather intelligence to combat this new form of terrorism. A new framework will take advantage of the United States full arsenal and perform at the highest standards. The more defined role for different agencies will simplify and advance our intelligence gathering and counterterrorism. Agencies in Framework There are four

A New Cover for Sparks

1454 words - 6 pages downfall or tragedy. “All of his books have been New York Times bestsellers, with over 89 million copies in print worldwide, in over 50 languages, including over 50 million copies in the United States alone, and his popularity continues to soar.” (Sparks). This statistic is impressive thinking how he started just writing for fun the became published a year or so after he wrote his first novel. In fact The Notebook made the Best Sellers list in

Similar Essays

Laos: The New Frontier For U.S. Companies

2104 words - 8 pages figures which included engraved French and Laos inscriptions. In 1957, the government issued notes denominated solely in kip. The notes were for 1, 5, 10, 20, 50, 100 and 500 kip. In 1963, 200 and 1000 kip notes were added, followed by 5000 kip notes in 1975. All banknotes were printed in France (Wikipedia). In 1976 the Pathet Laos took over the country and replaced the Royal Kip. By 1979 a currency reform took place introducing the new Lao PDR

Information Security: The Strength And Vulnerabilities Of The Trusted Platform Module

1318 words - 5 pages Progressive technological development has paved the way for the ever increasing addition of multiple disparate devices. Devices which have the capability to connect to each other over a network affording them the ability to communicate with ease. Unfortunately the improved proficiency for communication carries with it a negative impact on information security. This detriment comes through the increased possibility of data loss and vulnerability

Benefits For Companies Using Vo Ip Csi 120 74 Business Data Networks And Communications

515 words - 2 pages Benefits for Companies using VoIPVoIP provides integrated voice and data application. IP Telephony merges a telephone system with the computer network providing many advantages for a business ranging from reduced long distance expense to improved customer service. Furthermore, VoIP assists a business in improving, knowledge management, and conduct video conferencing.Benefits for Businesses conducting E-CommerceFor example: In the network

Fdr's New Deal Programs, Truman And His Fair Deal, Nixon And New Federalism And Jfk's New Frontier

855 words - 3 pages was an environmental program that put 2.5 million unmarried men to work maintaining and restoring forests, beaches, and parks. Workers earned only $1 a day but received free board and job training. From 1934 to 1937, this program funded similar programs for 8,500 women. The Civilian Conservation Corps taught the men and women of America how to live independently, thus, increasing their self-esteem. Many of FDR's programs in the New Deal not only