VoIP is becoming a predominant communication technology. As a result, security is a major issue. VoIP security threats include malware, impersonation, hijacking, and denial of service.
- [Instructor] In the early days of Voiceover IP,…there wasn't much concern over security.…However, VoIP is becoming a predominant…communication technology because of cost savings,…functionality, reliability, and integration with…the unified communication system.…VoIP is slowly replacing the plain old…telephone system or POTS.…As a result, security is a major issue.…VoIP security threats include malware,…eavesdropping, denial of service, and phreaking.…
Malware is malicious software and includes viruses,…worms, trojans, and backdoors.…VoIP uses software and is vulnerable to malware attacks…that can hijack the voice infrastructure and spread malware.…Defend against this threat by using antimalware software…along with patch and configuration management.…In addition, user education is essential…as one wrong click can release malware.…
With unencrypted voiceover IP, entities send…information to one another in plain text.…As a result, credentials are vulnerable to exposure.…By using a protocol analysis tool…during an unencrypted VoIP call, an attacker can…
Lisa Bock compares the traditional Public Switched Telephone Network (PSTN) to VoIP, and discusses the framework and components necessary for VoIP to be possible. She reviews codecs, including characteristics such as bitrate and voice quality; protocols for setup, communication control, and data transport; and media gateways, signaling protocols, and intermediary systems such as translators and mixers. Lisa then reviews business integration and the importance of conducting a needs analysis and network assessment prior to implementation. Learn about the many value-added services UC can provide, such as integrating VoIP with email, billing, management software, and other customer management systems. Lisa wraps up with a discussion on how ensuring quality of service (QoS) in a VoIP network minimizes latency and jitter and the importance of VoIP security to prevent malware, impersonation, hijacking, and denial of service attacks.
- History and evolution of PSTN
- UC overview and components
- Gateways, including signaling gateways, translators, and mixers
- Integrating VoIP and UC into your business network