Saturday, February 1, 2020
Voice over Internet Protocol Security Vulnerability and Risk Analysis Literature review
Voice over Internet Protocol Security Vulnerability and Risk Analysis - Literature review Example In modern times different means and mechanisms are being introduced for establishing communication with one another. The aim behind all of them has been to work on those lines that ensure reliable, fast and economical sources that can enable connecting people from across the borders and shores. The progress so made is so immense that people sitting across the continent can get in touch and see each other in matter of few seconds. Different means exist for such concepts. All those means of communication that have existed in history were conducted with a concern and consideration of privacy in them. This is achieved through encryption of data that is being exchanged between the two points. Voice over I.P (VOIP) is one of them. It has gained popularity in recent times and is being widely used .Like every other system in the field of telecommunications; VOIP has its strengths as well as weaknesses. Like every other internet utility, it has its own vulnerabilities and security concerns. This paper looks into the vulnerabilities and risks affiliated with it, further touching on the features being provided by it along with its working principles in brief. The paper also looks into the role of Voice over I.P Security Alliance and its efforts to meeting the demands in terms of narrowing down the vulnerabilities that exist in various forms. Keywords: VoIP, Open standard, Vulnerability, Denial of Service. ... VOIP is established on the concept of open standards to maximum its use and accessibility (Ellis, Pursell & Rahman,pg 250, 2003). Interoperability is another feature that is making inroads across the platform all over. Having mentioned the features that are being provided by VOIP, a serious concern is being raised about its security aspect. Many a times it is being tagged as vulnerable in terms of security aspects. For this purpose efforts are needed to be in place which will insure the safety of all parameters involved in this. This is possible through study of all those areas which have loop holes in them and further working on those areas will make this a safe source of communication for customers to use. VOIP is a generic term for number of applications intended for establishing connection (Persky 2007); it could be the chat client establishment, the phone call conversation, the SMS service establishment. VOIP makes use of number of protocols that contain both the open protocols and proprietary protocols. Through the use of single broadband line, VOIP enables sending voice signals, data that includes textual format and video format information. The vulnerabilities are not just limited to its usage and application, rather operating systems, and protocols used (McGann & Sicker 2005). Types of calls possible with VOIP: Unicast calls: This kind of calling conversation involves the minimum number of parties, one at each end. It is the SIP or H.323 based call. Mostly the traffic and conversation is not encrypted and hence unsafe. Multi cast calls (limited number of callers): This includes more than two users involved in a conversation at one time. Usually a conference call where the first two establish a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.