VoIP: A New Frontier for Security and Vulnerabilities Essay

VoIP: A New Frontier for Security and Vulnerabilities Essay

Length: 2721 words (7.8 double-spaced pages)

Rating: Powerful Essays

Open Document

Essay Preview

VoIP: A New Frontier for Security and Vulnerabilities

Introduction to Voice over IP Technology
     The promise of extremely cheap telephone service, utilizing the Internet to transmit voice, has made voice over IP an attractive and profitable idea. Vonage (http://www.vonage.com/) and other service providers entice consumers by charging a flat, monthly rate for unlimited long distance in the U.S. and Canada; the rate is often less than it would cost for a regular phone line without any long distance charges. An entity with an enormous call volume, such as a worldwide retail corporation, could benefit from tremendous cost savings by transitioning all of its telephony networks to VoIP.
     Voice over IP uses a server to connect all telephones in a local area network and act as a gateway for VoIP packets traveling to and from the Internet. Consumers with broadband internet connections can purchase VoIP handsets or routers with an RJ-11 jack to connect regular telephones. Businesses must implement a VoIP application server to handle corporate telephone use, much like mail servers are used to manage email. The Internet Protocol Private Branch eXchange (IP PBX) is telephone equipment used by private companies, rather than telephone service providers, for the management of VoIP calls placed on the data network. When considering VoIP, organizations should focus on necessary quality of service (QoS) requirements, the cost to implement, and a number of security precautions needed to protect the network (Mullins, 2005).
     The two most common protocols central to VoIP are Session Initiation Protocol (SIP) and H.323. Both also rely on a number of other protocols, such as DNS and ENUM, in order to locate and navigate to other hosts on the Internet.
     SIP first uses either TCP or UDP to signal a host on port 5060; then the Real-Time Transport Protocol (RTP) is used to transmit an audio stream over UDP ports 16384 through 32767 (Mullins, 2005). It is a broader specification, generally used to connect network devices to servers or other kinds of control equipment. SIP supports user authentication and the transmission of any type of media, including audio, video, and messaging.
     On the other hand, H.323 is a bit more complex, deri...

... middle of paper ...


Hall, M. (2005, March 21). SIP tips VoIP into secure. Computerworld. Retrieved March 24, 2005 from the World Wide Web: http://www.computerworld.com/printthis/2005/0,4814,100497,00.html

Korzeniowski, P. (2005, February 16). Why VoIP is raising new security concerns. IT Manager’s Journal. Retrieved March 24, 2005 from the World Wide Web: http://software.itmanagersjournal.com/print.pl?sid=05/02/11/0028208.

McArdle, D. (2005, February 18). Group tackles VoIP security fears. ElectricNews.Net. Retrieved March 24, 2005 from the World Wide Web: http://www.enn.ie/print.html?code=9589191.

Mullins, M. (2005, November 3). Doing the VoIP security groundwork. CNETAsia. Retrieved March 24, 2005 from the World Wide Web: http://asia.cnet.com.

Rendon, J. (2004, December 8). The security risks of VoIP. CIO News. Retrieved March 24, 2005 from the World Wide Web: http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci1032194,00.html.

Sullivan, A. (2005, March 21). Scam artists dial for dollars on Internet phones. Computerworld. Retrieved March 24, 2005 from the World Wide Web: http://www.computerworld.com/printthis/2005/0,4814,100549,00.html.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

The Expansion Of Frontier Model Essay

- There are several pieces to the puzzle when it comes to the Production Possibility Frontier model. The first most important thing to understand about this graph is what a production possibility frontier (PPF for short) actually is. Essentially, a PPF is the curve (line) on the graph that demonstrates the place where a two-good economy is the most efficient in its production of, for example, smartphones and computers and is usually constructed on the basis of inputs and outputs (Afonso, 2013, p. 4488)....   [tags: Economics, Production-possibility frontier]

Powerful Essays
747 words (2.1 pages)

Essay about Cyber Warfare : The New Frontier

- Andrew Massung Mr. Wyse ENC 1101 15 October 2015 Cyber Warfare: the New Frontier Since the beginning of time, mankind has waged war against each other. Over the years warfare has evolved, from fighting with sticks and stones to using gunpowder and launching missiles. The newest, and possibly most destructive, type of warfare is cyber warfare. Cyber warfare has the possibility to be more devastating than nuclear warfare. The world is in another cold war, except this time countries are battling for cyber supremacy....   [tags: Nuclear weapon, World War II, Cyberspace]

Powerful Essays
1366 words (3.9 pages)

Voip, Voice Over Internet Protocol Essay

- VoIP, Voice over Internet Protocol, is an emerging new technology that involves the routing of voice conversations over the Internet or any other IP – based network. It does not utilize traditional dedicated, circuit – switched voice transmission lines. Voice data flows over a general – purpose packet switched network Problems associated with VoIP includes echoes, jitter, latency, packet loss....   [tags: Technology Voip Internet]

Free Essays
1948 words (5.6 pages)

The New Frontier Essay

- John Fitzgerald Kennedy was one of the most famous and influential presidents in the history of the United States. During his presidency, he attempted to make several reforms, supported by his “New Frontier” legislature. The goals of the New Frontier were to improve school funding, civil rights, and foreign policy. The New Frontier was to make the American population feel as if no frontier was impossible to achieve, including the controversial final frontier of space. Despite the fact that many of his acts and bills were not passed or supported by Congress, the New Frontier was what led to many of the greatest advancements which helped shape America today....   [tags: null]

Powerful Essays
1413 words (4 pages)

Essay on The Potential Of Wireless Voip

- - The potential of wireless VoiP solution: Potential Voip are used in mobile devices and other for communication security purpose. Communication, Mobile VoIP will quite simply create calls, it conjointly receives faxes. Why would a business have an interest during this on the face of it out-of-date service. a major portion of companies, government bodies, and medical facilities still use some sort of fax service to send and receive physical documents. If a client or seller prefers to send you a fax, most VoIP solutions square measure equipped to receive and convert fax documents into a PDF file....   [tags: Mobile phone, Telephone, IP Phone, Bluetooth]

Powerful Essays
1021 words (2.9 pages)

Essay on VOIP Phone System Deployment

- VOIP DEPLOYMENT Welcome to the deployment of voice over IP or VOIP. This paper will explain the advantages and the disadvantages of using VOIP. The quality of service or QoS will be discussed. Security problems and solutions for IP telephone systems and networks. The basics and many protocols will be discussed. The voice clarity considerations will be discussed. Business 911 requirements for VOIP phone systems. The end-to-end VPN’s versus firewall-based VPNs. VOIP what are the advantages of having the system....   [tags: voice over internet protocol]

Powerful Essays
1466 words (4.2 pages)

The Frontier as a Place of Ethnic and Religion Conflict by Patricia Nelson Limerick

- ... This caused the men who came looking for riches and jobs to become violent. In “Wyoming Gunfight: An attack on Chinatown, 1885,” Hon. Huang Sih Chuen reported on how there was a group of white men who formed the Rock Springs wanted to rid the land of all Chinamen started to kill and rob Chinese men in the streets of Chinatown, and murdering others by burning them alive in buildings (46). The Rock Springs were the many people who blamed the Chinese for the lack of availability for jobs. They claimed that the Chinese are willing to work for less than the whites do; therefore no strikes can be done so that wages can be raised....   [tags: freedom, western frontier]

Powerful Essays
1414 words (4 pages)

The new Frontier Essay

- Question #4 Section 1 Dusty trails, wagon trains, and tough guys on horses, the images that come to most peoples mind when they think of the migration towards the western frontiers. Today we are able to see the obvious effects that this migration has left on our society even today; (Sunny and warm Phoenix, hip coffee from Seattle, and that strange utopia of its own, California) but what are some of the not so obvious effects that it left. The late 1800’s was a time of many great opportunities and advancements for the American people....   [tags: essays research papers]

Free Essays
653 words (1.9 pages)

Future of VoIP Technology Essay

- Future of VoIP Technology VoIP is a relatively new technology and so the benefits are just beginning to be realized. VoIP technology has the ability to completely change the telephone industry as we know it. Big changes are in store for the way we use telephones and this section will address some of the changes to expect. Obstacles still stand in the way of progression and there are problems that need to be addressed before this technology can take over. Individuals have some great things to look forward to....   [tags: essays research papers]

Powerful Essays
589 words (1.7 pages)

IT Security Essay

- Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks....   [tags: Cyber-security, Enterprise Security]

Powerful Essays
3468 words (9.9 pages)