Security issiues in VOIP Applications
Security issiues in VOIP ApplicationsAuthor: Kathiresan & RanjithakumariINTRODUCTION The evolution in the networks & internet has increased different types of applications. One such application is VOIP which has become an alternative to traditional telephone network (public switched telephone network, or PSTN) offering versatile, flexible & economical speech communication. The PSTN of course, is not invulnerable to security breaches. Some of the earliest hackers were "phone phreakers", who specialized in making unauthorized long distance calls.
Today, the threat caused by hackers to IP networks goes far beyond the cost of unauthorized long-distance calls. An attack could take down the network (and thus the company's phone service) for hours or days, and the content of calls intercepted, divulging trade secrets, confidential client information and more. That makes security a very important issue .Here we are going to discuss the the attacks and the relevant counter measure to provide appropriate levels of security for VOIP networks. VOIP (Voice Over Internet Protocol) The first experiment on telephony networks were conducted by the researchers at MIT in 1970s & the internet protocol specification RFC741 for “Network Voice Protocol “ was published in the year 1977.VOIP uses packet switching which sends digitized data packets over the internet using many possible paths.
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14
Where to Travel With Kids on a BudgetWhere to Travel With Kids on a BudgetAuthor: Stuart S. TravelOf course you can travel just about anywhere with your kids on a budget. Like any travel experience on a budget you need to research and plan well to make the most of your travel dollar. Many places, however, are family or kid friendly and will throw in added extras for the children. So whether you intend traveling at home or abroad, look for places that will cater to your family’s needs. |
Creating an Information FactoryCreating an Information FactoryAuthor: Tim Bryce"Q: How many interpretations of systems development are there? A: How many analysts and programmers have you got?" - Bryce's Law INTRODUCTION Back in the early 1980's, Japan's MITI (Ministry of International Trade & Industry) coordinated a handful of Japanese computer manufacturers in establishing a special environment for producing system software, such as operating systems and compilers. |