Friday, April 19, 2019
Voice over Internet Protocol Security Vulnerability and Risk Analysis Literature review
interpretive program over Internet protocol Security Vulnerability and Risk Analysis - Literature review ExampleIn modern quantify different means and mechanisms atomic number 18 being introduced for establishing confabulation with one an new(prenominal). The aim behind all of them has been to run away on those lines that ensure reliable, fast and economical sources that can enable connecting people from across the borders and shores. The progress so made is so immense that people sitting across the continent can get in touch and see each other in matter of few seconds. Different means exist for such concepts. All those means of communication that have existed in history were conducted with a concern and friendliness of privacy in them. This is achieved through encryption of data that is being exchanged between the ii points. Voice over I.P (VOIP) is one of them. It has gained popularity in recent times and is being widely physical exertiond .Like every other system in the field of telecommunications VOIP has its strengths as well as weaknesses. Like every other net profit utility, it has its own vulnerabilities and security concerns. This paper looks into the vulnerabilities and risks affiliated with it, further touching on the features being provided by it along with its working principles in brief. The paper also looks into the role of Voice over I.P Security Alliance and its efforts to conflict the demands in terms of narrowing down the vulnerabilities that exist in various forms.Keywords VoIP, Open standard, Vulnerability, Denial of Service.... VOIP is accomplished on the concept of open standards to maximum its use and accessibility (Ellis, Pursell & Rahman,pg 250, 2003). Interoperability is another feature that is making inroads across the platform all over. Having mentioned the features that are being provided by VOIP, a serious concern is being raised about its security aspect. Many a times it is being tagged as vulnerable in terms of se curity aspects. For this purpose efforts are needed to be in place which will go out the safety of all parameters involved in this. This is possible through study of all those areas which have eyelet holes in them and further working on those areas will make this a safe source of communication for customers to use. VOIP is a generic term for number of applications intended for establishing connection (Persky 2007) it could be the chat client establishment, the skirt call conversation, the SMS service establishment. VOIP makes use of number of protocols that contain both the open protocols and proprietary protocols. Through the use of single broadband line, VOIP enables sending voice signals, data that includes textual format and video format information. The vulnerabilities are not just limited to its usage and application, rather operating systems, and protocols used (McGann & Sicker 2005). Types of calls possible with VOIP Unicast calls This kind of duty conversation involves t he minimum number of parties, one at each end. It is the SIP or H.323 based call. generally the traffic and conversation is not encrypted and hence unsafe. Multi cast calls (limited number of callers) This includes more than two users involved in a conversation at one time. Usually a conference call where the first two establish a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.