Prevention of VoIP System to avoid risk - PowerPoint PPT Presentation

About This Presentation
Title:

Prevention of VoIP System to avoid risk

Description:

Voice over IP (VoIP) presents totally different challenges than a public switched telephone network (PSTN). It runs on the web and inherits many challenges for VoIP service providers on a way to secure VoIP system. Until now, security has been overshadowed by the attractiveness of VoIP technology. – PowerPoint PPT presentation

Number of Views:11

less

Transcript and Presenter's Notes

Title: Prevention of VoIP System to avoid risk


1
Prevention of
  • VoIP
  • System to avoid risk

2
Voice over IP (VoIP) presents totally different
challenges than a public switched telephone
network (PSTN). It runs on the web and inherits
many challenges for VoIP service providers on a
way to secure VoIP system. Until now, security
has been overshadowed by the attractiveness of
VoIP technology.
Security Risks Meanwhile, VoIP traffic remains on
networks that arent sufficiently protected. This
infrastructure includes personal branch exchange
systems gateways proxy, registrar and locator
servers, and phones. every VoIP component is
available and accessible over the information
network. Therefore, before deploying VoIP system
you need to remember its security risks and also
the countermeasures. In fact, the potential
threats area unit numerous and embody, as an
example, attacks on the confidentiality,
integrity and accessibility of the system.
3
The top security issues associated with VoIP
implementation are
  • Interception of calls
  • Denial of service attacks
  • Theft of service
  • ?
  • ?

Exfiltration of data with the help of media
session Malware embedded in media and signalling
session
4
  • How to Secure VoIP System
  • First of all, carefully choose proper VoIP
    protocols. The equipment should satisfy your
    requirements
  • Especially relevant is to disable unneeded
    protocols, which could harbour unknown
    vulnerabilities
  • Perform a security audit of each VoIP element
    that is accessible on the network. Check
    telephones and terminals. VoIP elements are
    software components running on hardware. Make
    sure its possible to manage the underlying
    operating system
  • Separate the VoIP and other IP-based
    infrastructure using logical or physical
    separators
  • Authenticate remote operations. Noteworthy to use
    only an authorised personnel from authorised
    locations
  • Make sure the VoIP security system will track the
    communications ports by reading within the
    signalling packets to find the chosen ports and
    enable two endpoints to send media packets to
    every other
  • Noteworthy to include your VoIP servers in the
    tape backup schedule. Without a backup, you will
    be unable to restore telephony
  • Use Network Address Translation (NAT), because it
    converts internal IP addresses into a single,
    globally unique IP address for routing across the
    Internet.

5
In conclusion please note that the list is not
exhaustive and only includes some of the most
common tips for mitigating security
issues. iNextrix, along with providing VOIP
solutions also focuses on securing your VOIP
systems and save you from the disasters which
can happen by using Non-secure VOIP systems.
6
Thanks for your auspicious visit here and we hope
you will enjoy our Services.
Write a Comment
User Comments (0)
About PowerShow.com