This website uses cookies to ensure you have the best experience. Learn more

Vo Ip: A New Frontier For Security And Vulnerabilities

2668 words - 11 pages

VoIP: A New Frontier for Security and Vulnerabilities

Introduction to Voice over IP Technology
     The promise of extremely cheap telephone service, utilizing the Internet to transmit voice, has made voice over IP an attractive and profitable idea. Vonage (http://www.vonage.com/) and other service providers entice consumers by charging a flat, monthly rate for unlimited long distance in the U.S. and Canada; the rate is often less than it would cost for a regular phone line without any long distance charges. An entity with an enormous call volume, such as a worldwide retail corporation, could benefit from tremendous cost savings by transitioning all of its telephony networks to VoIP.
     Voice over IP uses a server to connect all telephones in a local area network and act as a gateway for VoIP packets traveling to and from the Internet. Consumers with broadband internet connections can purchase VoIP handsets or routers with an RJ-11 jack to connect regular telephones. Businesses must implement a VoIP application server to handle corporate telephone use, much like mail servers are used to manage email. The Internet Protocol Private Branch eXchange (IP PBX) is telephone equipment used by private companies, rather than telephone service providers, for the management of VoIP calls placed on the data network. When considering VoIP, organizations should focus on necessary quality of service (QoS) requirements, the cost to implement, and a number of security precautions needed to protect the network (Mullins, 2005).
Protocols
     The two most common protocols central to VoIP are Session Initiation Protocol (SIP) and H.323. Both also rely on a number of other protocols, such as DNS and ENUM, in order to locate and navigate to other hosts on the Internet.
     SIP first uses either TCP or UDP to signal a host on port 5060; then the Real-Time Transport Protocol (RTP) is used to transmit an audio stream over UDP ports 16384 through 32767 (Mullins, 2005). It is a broader specification, generally used to connect network devices to servers or other kinds of control equipment. SIP supports user authentication and the transmission of any type of media, including audio, video, and messaging.
     On the other hand, H.323 is a bit more complex, deriving much of its design from legacy communication systems. Some would argue that it is also better, having already experienced and solved communication problems in the past. H.323 utilizes unicast and multicast on UDP port 1718 to locate the gateway; then remote access service (RAS) is started on UDP port 1719. H.225 and H.245 are also used for call signaling over TCP port 1720 and data transmission over TCP ports 1000 through 65535 (Mullins, 2005).

Security Concerns
     As with any new technology of the Information Age which has had groundbreaking implications for...

Find Another Essay On VoIP: A New Frontier for Security and Vulnerabilities

Benefits for Companies using VoIP -CSI 120-74 Business Data Networks and Communications

515 words - 2 pages Benefits for Companies using VoIPVoIP provides integrated voice and data application. IP Telephony merges a telephone system with the computer network providing many advantages for a business ranging from reduced long distance expense to improved customer service. Furthermore, VoIP assists a business in improving, knowledge management, and conduct video conferencing.Benefits for Businesses conducting E-CommerceFor example: In the network

Writing and Reading for a New Generation

1780 words - 7 pages “Writing and Reading for a New Generation” In the past decade, the Internet has taken over. Everyone from young children to senior citizens can communicate, send e-mail, or look up any bit of information in seconds. Because of the overwhelming shift to Internet technology and communication, many aspects of writing have been forever changed. Writers often write differently for the Internet than they do for a physical publication. Readers

A New Ending for Romeo And Juliet

869 words - 3 pages New Ending Act V, Scene III Verona. A churchyard; the monument of the Capulets. Enter Romeo and Paris. Paris This is that banished haughty Montague, That murdered my love’s cousin, with which grief It is supposed that fair creature died, And here is come to do some villainous shame To the dead bodies. I will apprehend him. Stop thy unhallowed toil vile Montague. Can vengance be pursued further than death? Condemned villian, I do apprehend

Productive Efficiency and In Efficiency of a Production Possibility Frontier

1408 words - 6 pages frontier. The government barely assumes that in that particular situation ecological calamities, natural disasters and military intrusion will not happen. The assumption is usually that even if these calamities do happen they cannot negatively affect the production possibility frontier (PPF) in any way. Other assumptions that are made include land level being held constant among others (Thompson 1985). A good example is shown below. For example, if we

The New Great Game for Energy and Security in Central Asia

1503 words - 7 pages energy security of China, US, Russia, EU and other non-European states, the risk of new wave of terrorism after withdrawal of coalition forces forma Afghanistan). The security of this region for the author is the result of all of the factors mentioned above). This can be operationalize into the hypothesis that the Central Asia is once more a pivot area for the world politics. It is the authors will to prove that the ending of ISAF mission this

The West As A Wild And Untamed Frontier

3160 words - 13 pages . Ironically, this is something of a nostalgic work for Remington, depicting "plains military action from the 1860's"18, thus making the theme of the passing frontier even more evident.The most telling of Remington's works on the end of the West as frontier is probably "Fight for the Waterhole"19 from 1903. While on the surface it may only appear to be another depiction of the West as dangerous and violent, beneath the surface it is much more. Here is

Why Was There Opposition To Kennedy's 'New Frontier' And Johnson's 'Great Society'?

616 words - 2 pages President Kennedy’s ‘New Frontier’ and President Johnson’s ‘Great Society’ both proposed major changes to the USA under economic, social and civil rights issues. However, because some of the changes were so radical, the programs faced considerable opposition from a variety of groups and this had an effect on their success. Kennedy and Johnson both faced individual opposition to their policies. However Kennedy

Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

872 words - 4 pages Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico The article “Toward a New Trilateral Strategic Security Relationship” written by Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano and Todd S. Hataley, published in the Journal of Strategic Security; introduces the idea(s) of a trilateral strategic security relationship between the United States, Canada, and Mexico. The term trilateral means to involve or

New-Hire Onboarding and Information Security

1179 words - 5 pages New employees, full-time or non-employee contractors, present a number of risks in regards to information security. These risks can be mitigated with well-designed and thorough interview and onboarding processes. An organization’s human resources department must have guidelines in place for interviewers and hiring managers to follow to allow for high-risk potential candidates to be filtered out prior to hiring. The importance of information

Colonists and Indians Fight for Mutual Interests on the American Frontier

2312 words - 9 pages American culture and its development has to include mythology, because that is where most of the information about early America is found. Mythology is a unique source in that it gives a shared understanding that people have with regard to some aspect of their world. The most important experience for American frontiersmen is the challenge to the “myth of the frontier” that they believed in – “the conception of America as a wide-open land of

Room for a Cosmopolitan Future: Habermas and the New Order

1270 words - 6 pages based on more than the inherent irregularities present in transnational relations or a common commitment to the notion of ‘Human Rights’. He suggests that this new order, the cosmopolitan law, would need to have a coercive capacity for binding governments, without making reference to any notional standard of nationalism, in order to protect individuals as legally free and equal citizens of the world. This, he advises, could be achieved through

Similar Essays

Laos: The New Frontier For U.S. Companies

2104 words - 8 pages figures which included engraved French and Laos inscriptions. In 1957, the government issued notes denominated solely in kip. The notes were for 1, 5, 10, 20, 50, 100 and 500 kip. In 1963, 200 and 1000 kip notes were added, followed by 5000 kip notes in 1975. All banknotes were printed in France (Wikipedia). In 1976 the Pathet Laos took over the country and replaced the Royal Kip. By 1979 a currency reform took place introducing the new Lao PDR

The Purpose Of This Assignment Is To Analyse Source Code And Look For Vulnerabilities. The Vulnerabilities Identified Will Be Exploited With A

1475 words - 6 pages 3.1 Exploit XSS Vulnerabilities The standard javascript code to test for XSS vulnerabilities is : . The script is entered on the register page in the email address input. The script must be entered in the email input when the user registers. The attack is amended with the SQL injection added at the end. The standard javascript attack works but the SQL injection at the end add a value in the field. ' or '1'='1' -- '. The script allows the

Information Security: The Strength And Vulnerabilities Of The Trusted Platform Module

1318 words - 5 pages Progressive technological development has paved the way for the ever increasing addition of multiple disparate devices. Devices which have the capability to connect to each other over a network affording them the ability to communicate with ease. Unfortunately the improved proficiency for communication carries with it a negative impact on information security. This detriment comes through the increased possibility of data loss and vulnerability

Fdr's New Deal Programs, Truman And His Fair Deal, Nixon And New Federalism And Jfk's New Frontier

855 words - 3 pages was an environmental program that put 2.5 million unmarried men to work maintaining and restoring forests, beaches, and parks. Workers earned only $1 a day but received free board and job training. From 1934 to 1937, this program funded similar programs for 8,500 women. The Civilian Conservation Corps taught the men and women of America how to live independently, thus, increasing their self-esteem. Many of FDR's programs in the New Deal not only