Free Essay

Voip Security in the Enterprise

In:

Submitted By dianakay18
Words 1279
Pages 6
Introduction
Voice over IP (VoIP) is the transmission of voice over packet-switched IP networks, as of right now it is one of the most prominent emerging trends in the revolution of telecommunications (Thermos, 2009). Almost everyone one is driven by technology in one way or the other. With this drastic growth in technology over the pass years and with this rapid growth in advancement it as also presented many ground-breaking improvements; which have contributed significantly to the simplification of day-to-day activities. Nevertheless, this advancement may have a negative effect on the way we communicate using these technology we have come to love. However, with the demand for communication technology on the rise so is the need for additional security. This paper will look at the implementation of VoIP and the necessary security needed in the Enterprise for transmission of safe commination. In addition, this paper will also explain the many advantages and disadvantages (risk) of using a technology such has VoIP in the Enterprise.
Implementation Tips
VoIP can be very successful in the enterprise if it is done properly using the right techniques and technology that is the right fit for the organization. On the other hand, it can be very unsuccessful and a huge failure. Some companies when considering implementing voice over IP they fail to first make sure that the system is working properly before putting aside their grandfathered system, such as private branch exchange (PBX). As with any new technology VoIP too has security risk. Therefore, companies must also take into account the correct security policies before they implement VoIP which will aid the company in having a better protected device (Thermos, 2009). In addition, implementing security protocol should be an essential part when considering making the switch from traditional phone systems, and should also take into account the specific types of applications being use in the company. Some Administrator may presume that it is not important to put into place additional security techniques for VoIP since the transmission is digitized voice; which travels through packets they can simply just plug VoIP component into their previously secured network and it too will be secure. However, this is far from reality and with serious consequences. Some security features that the companies could consider when implementing VoIP should include: VoIP “aware” firewall, Authentication, Developing appropriate network architecture (Fries, Kuhn, & Walsh, 2005).
Security
Like with traditional data being transmitted over the network the same heighten security is needed for VoIP. One such example is DOS attacks which could be done quite easily by downloading tools off the internet. Therefore, it is very important that VoIP servers be placed behind VoIP firewalls which will help to prevent DOS penetration into the network. Authentication is needed for VoIP users just like in the data world, people will still have the need to make sure that the person on the other end of the line is who they say they are, this can be accomplish by using H.323, SIP and MGCP standards (Weiss, 2001). The H.235 component of H.323 specifies two types of authentications which include: Symmetric encryption which is a method that is less stressful on the processor usage and therefore consumes less power and does not require any form of communication between the two devices (Weiss, 2001). Subscription based method require the sharing of a secret key before the communication between to the two devices can be completed. However, the administrator must keep in mind that this method will require a lot of CPU power and time if it is using symmetric encryption which is way more secure than asymmetric encryption. In addition, H.235 also accommodates the use of IPSEC to handle authentication between the devices that are trying to communicate with each other. The SIP protocol includes three different types of authentication: Basic Authentication, Digest Authentication, and PGP Authentication (Weiss, 2001). (Fries, Kuhn & Walsh, 2005). Diagram
Advantage of Using VoIP in the Enterprise
When implemented properly using the right infrastructures and security techniques, VoIP can significantly improve the way an Enterprise communicate and operates in a successful environment. One of the many advantages of implement VoIP over traditional telephone service is that the Enterprise could see drastic cost saving in long-distance calls. Therefore, this implementation can be very beneficial to a company that operates in numerous areas whether local or internationally, since the caller’s voice is converted to data and transfer over the internet to a VoIP phone on the other end (Shavit, 2007). In addition, VoIP can also connect with other communications media which is known as “unified communication”. A company can also combine email and VoIP therefore their employees/users can access voicemail through their email clients which is not possible with traditional phone service (Shavit, 2007).
Disadvantage of using VoIP in the Enterprise
On the other hand, with the many technological developments VoIP opens the telephony system to numerous kinds of vulnerabilities that did not exist in traditional telephone systems (circuit switching). One of the many disadvantages of implementing VoIP in the Enterprise is that the VoIP telephone system is connected directly to the network. Therefore, if the network goes down so does the telephone system in the Enterprise. It also opens the door for more security risks because securing VoIP traffic at the firewall level presents certain challenges. One of the challenges is that “not all firewalls are VoIP aware and older firewall may not recognize VoIP protocols such as SIP, MGCP or Cisco’s SCCP protocol, and incorrectly block this traffic (Ruck, 2010).” In addition, like in the data world many firewalls actively scan network traffic packets as an intrusion detection/prevention system. This type of sort scanning is not recommended because of the time-sensitivity of VoIP traffic. The implementation of VoIP also present patching problems, since some administrators may over-look this issue as it might be seen as being unnecessary. Even though, most VoIP “phones use trivial file transfer protocol (TFTP) to update software or firmware and in many cases this set-up occur without authentication” (Ruck, 2010). Therefore, a compromised TFTP server will undoubtedly allow hackers to place files in the upload directory and it would be loaded into the telephone system (Thermos, 2009). Hence, it is a must that VoIP phone systems obtain regular patching to the call management system, voicemail, infrastructure, and endpoints, in or to maintaining a well secure network and telephone system.

Conclusion/ Recommendation
At the end, with the rapid growth of technology over the past years so as the need for proper security. With the implementation of voice over IP in the Enterprise, administrators should keep in mind that voice transfer should be secure using the right security methods just as they would protect data. In addition, all VoIP traffic travelling over a public IP network should be encrypted to ensure a secure communication between end-users. Like with any good network, administrators should do regular audits to make sure that there is no weakness in the network infrastructure through which unauthorized users will be able meddle around on the network and create any damage. It is also very important that firewalls are “VoIP ware”; if this is not the case then the necessary changes should be made ahead of any problem that might arise. There are many disadvantage in using VoIP over traditional phone lines but if implemented properly VoIP can significantly improve the communication within an Enterprise. Nevertheless, with demand of more advance technology it is without a doubt that VoIP could be the next way of communicating, and many Enterprise might make the switch, and traditional phone service will be a distance pass.

Similar Documents

Free Essay

It Security

...Internet Protocol (VoIP) service for a small company with approximately 50 employees with approximately over 700 accounts. The clients currently call in orders using the existing traditional public switched telephone network (PSTN). The Voice over Internet Protocol (VoIP) technology will have an established voice communication and multimedia sessions over Internet Protocol (IP) networks where the orders can be processed at a cost savings. Technology Description The group of technologies: IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone service are terms commonly related to VoIP. The technology enables the end users to use voice, fax, SMS, voice messaging through the internet to conduct business. Proposal The Request for Proposal lists the instructions for a quote to be submitted timely by the respective vendors. In addition, the description of the project is included and the defined requirements that must be met for consideration. Lastly, the vendor responsibility is defined before and after completion of the project. Specifications The proposal is to switch to VoIP, a hosted phone system with a full set of enterprise features. The intent is to continue to upgrade the system via web browser to ensure the technology continues to remain competitive. The intent is to transition away from analog lines and adapt to newer technology. Required Deliverables 1. Asses the security threats, confidentiality...

Words: 635 - Pages: 3

Free Essay

E-Business - Voice over Ip

...individuals, groups and other businesses. Electronic business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers. Key-Words: - VoIP, gatekeeper, endpoint, gateway, softphone, asterisk 1 Introduction E-business involves business processes spanning the entire value chain: electronic purchasing and supply chain management, processing orders electronically, handling customer service, and cooperating with business partners. Special technical standards for e-business facilitate the exchange of data between companies. E-business software solutions allow the integration of intra and inter firm business processes. E-business can be conducted using the Web, the Internet, intranets, extranets, or some combination of these. Applications for electronic business can be divided into three categories: a) Internal business systems: o customer relationship management o enterprise resource planning o document management systems o human resources management b) Enterprise...

Words: 5944 - Pages: 24

Free Essay

Joe's Yacht's

...and custom yachts, based out of Myrtle Beach, South Carolina, with 15 locations across four states in the south-eastern coastal area. The company means to upgrade its network design and components to improve network capacity, provide wireless services at their stores, offer more robust security services, and implement store-to-store VoIP services to replace the existing traditional phone service. The “Evaluation of Existing Network Infrastructure” section of this document details the current network employed by Joe’s Yachts and explains its weaknesses in terms of data rate and capacity, security features and functionality. The next section “Requirements Review” goes over the technical and business goals identified for Joe’s Yachts network infrastructure design upgrade. In the “Proposed Network Design” section following that, this document describes the network design proposed by High-Power Solutions, which is to implement a two-step solution in the form of a bundle offered by AT&T. This bundle includes managed internet services for point-to-multipoint interconnectivity between all locations and the business-in-the-box service, which combines VoIP, Internet, router and switch and security features in one hardware platform. It...

Words: 2092 - Pages: 9

Free Essay

Wfl: Strategic It Implications

...costs while increasing revenues is vital in business today and Government agencies are no exception to this rule. With the Federal deficit out of control the Government has been forced to limit budgets for its agencies and to put in place accountability measures. The company I will analyze in this paper is a Federal agency called the Western Federal Lands Highway Division (WFL), a child agency of the Federal Highway Administration. I will look at a number of technologies with the potential of reducing business costs while increasing productivity, and which may result in a flattening of the organization hierarchy. Forefront in all this is Telecommuting and its related technologies such as Teleconferencing, VPN, VoIP, and Cloud Computing. We will also analyze Enterprise applications and web services as another possible option to tie the functional areas of WFL together and determine whether it is cost effective to implement such a system. Background of WFL The purpose of WFL is to build Federal roads. According to their website, The Western Federal Lands Highway Division (WFL) operates as...

Words: 3150 - Pages: 13

Free Essay

Voice over Wireless Local Area Network

...traffic over a wireless broadband network. The type of wireless set up is basically VoIP sent over a WiFi Access Point. Within the industry this type of VoIP set up is call VoWLAN or WiFi VoIP because it uses the standards set for transporting data by the IEEE 802.11 for wireless technology. In order to use this technology we have to use a VoWLAN enabled device; the most common device on the main stream market is the PDA. There are other devices available like the WiFi handset which looks like a cell phone, but it allows voice data packets sent over the network rather than the normal analog voice signal. One of the other major enterprise level devices is not a device at all. It is software based and is loaded on to a workstation or laptop. This type of software is call softphone. It is a virtual phone that routes call through the WLAN AP to the VoIP gateway or IP PBX. There are some advantages and disadvantages to using this type of technology. One of the major advantages is cost a majority of user have WiFi hotspot available in order to stay connected. “A big advantage of wireless VoIP is that IP phones that work on Wi-Fi networks can be used in place of cell phones in many cases. Public 802.11 hotspots are often free or available at a low daily cost. If you're connecting to the Wi-Fi network anyway for Web and e-mail access, there's no additional cost to make VoIP calls other than the cost of your VoIP service, which is usually far less than...

Words: 661 - Pages: 3

Premium Essay

Voip

...Voip and Ip Telephony Implementations [pic] VoIP and IP Telephony: Planning and Implementation Table of Contents Executive Summary………. Legacy Telephony Technology………. Public Switched Telephone Network (PSTN) ………. IP Technology Solution Overview………. What is VoIP and how it works?.......... What is IP Telephony? ) ………. Benefits of IP Communications over a Converged Intelligent Network) ………. Economy) ………. Flexibility) ………. Resilience) ………. Productivity) ………. Building Blocks of Converged IP Communications Networks) ………. Network Infrastructure) ………. Applications) ………. End Points (Client Devices) ) ………. Call Processing) ………. Major IP Communications Solutions) ………. IP Telephony) ………. Considerations for Deploying IP Telephony) ………. IP Conferencing) ………. IP Contact Centers) ………. Unified Messaging) ………. Rich Media Communications—Integrated Audio, Video, and Web Conferencing) IP Videoconferencing) ………. IP Video Telephony) ………. Extension Mobility) ………. IP Telephony Applications) ………. Mobility Applications) ………. Softphones/Soft-agents ) ………. 802.11a/b/g Wireless LANs and Wireless or Soft IP Phones ) ………. Teleworker / Support) ………. Emergency Alerting Applications ) ………. Business Continuity / Disaster Recovery) ………. Land and Mobile Radio Convergence) ………. N11 Services—211, 311, 511, 711 Services to Relieve Overburdened 911 Systems ) ………. Video/Audio-On-Demand, E-Learning) ………. A "Typical" VoIP Configuration………. The Economics of VoIP ………. Selecting the...

Words: 10553 - Pages: 43

Premium Essay

Voip and Ip Telephony Implementations

...[pic] VoIP and IP Telephony: Planning and Implementation Table of Contents Executive Summary………. Legacy Telephony Technology………. Public Switched Telephone Network (PSTN) ………. IP Technology Solution Overview………. What is VoIP and how it works?.......... What is IP Telephony? ) ………. Benefits of IP Communications over a Converged Intelligent Network) ………. Economy) ………. Flexibility) ………. Resilience) ………. Productivity) ………. Building Blocks of Converged IP Communications Networks) ………. Network Infrastructure) ………. Applications) ………. End Points (Client Devices) ) ………. Call Processing) ………. Major IP Communications Solutions) ………. IP Telephony) ………. Considerations for Deploying IP Telephony) ………. IP Conferencing) ………. IP Contact Centers) ………. Unified Messaging) ………. Rich Media Communications—Integrated Audio, Video, and Web Conferencing) IP Videoconferencing) ………. IP Video Telephony) ………. Extension Mobility) ………. IP Telephony Applications) ………. Mobility Applications) ………. Softphones/Soft-agents ) ………. 802.11a/b/g Wireless LANs and Wireless or Soft IP Phones ) ………. Teleworker / Support) ………. Emergency Alerting Applications ) ………. Business Continuity / Disaster Recovery) ………. Land and Mobile Radio Convergence) ………. N11 Services—211, 311, 511, 711 Services to Relieve Overburdened 911 Systems ) ………. Video/Audio-On-Demand, E-Learning) ………. A "Typical" VoIP Configuration………...

Words: 10550 - Pages: 43

Free Essay

Voip Essay

...TRENDS &STRATEGIES Wading Into IP Telephony ..........................4 Getting ROI From VoIP ..............................7 VoIP Monitoring Tools ............................10 VoIP Security .......................................13 Call Centers and IP ................................15 Voice Over Wireless LANs .......................18 RESOURCES QuickStudy:Session Initiation Protocol ......21 Emerging Technology:..........................23 IP Videoconferencing IPCommunications Voice-over-IP is changing the way we think of,and manage,communications. Compliments of Computerworld Executive Bulletin IP Communications 2 Converged IP networks allow for a wide variety of new applications to ride on the network and interact, including IP telephony,audioconfer- encing,videoconferencing,unified messaging and presence technolo- gies (like chat). Getting Started Corporate America is just starting down the road to voice-over-IP (VoIP)communications,though every analyst says it¡¯s just a matter of time before it becomes main- stream.¡°By 2009,the installed base of IP [communications]equipment will dominate the enterprise land- scape,but that¡¯s still a few years away,¡±says Robert Rosenberg,presi- dent of Insight Research Corp.in Boonton,N.J. There are several reasons why VoIP hasn¡¯t been an overnight suc- cess.Companies started testing the waters of VoIP in 2001,but there were serious concerns about voice sound quality that slowed the mo- mentum...

Words: 10014 - Pages: 41

Free Essay

Is535 Course Project

...costs while increasing revenues is vital in business today and Government agencies are no exception to this rule. With Federal deficit out of control the Government has been forced to limit budgets for its agencies and to put in place accountability measures. The Company we will analyze in this paper is a Federal agency called the Western Federal Lands Highway Division (WFL), a child agency of the Federal Highway Administration. We will look at a number of technologies with the potential of reducing business costs while increasing productivity, and which may result in a flattening of the organization hierarchy. Forefront in all this is Telecommuting and its related technologies such as Teleconferencing, VPN, VoIP, and Cloud Computing. We will also analyze Enterprise applications and web services as another possible option to tie the functional areas of WFL together and determine whether it is cost effective to implement such a system. The purpose of WFL is to build Federal roads. According to their website, The Western Federal Lands Highway Division (WFL) operates as part of the Federal Lands Highway Program, serving the needs of Oregon,...

Words: 3198 - Pages: 13

Premium Essay

Network Design

...Security Proposal Nickolas Dunkle Isaac Mundt Michael Yeager Thomas Sevastos John Dyer Jacob Skrzynski Joseph Weidner Pam Marshall Christopher Montgomery ITT Technical Institute Network Systems Administration Capstone Project Ryan Rucker May 17, 2015 Part 1 - Structure of WAN In this design of a high level network for ABC Company we will provide a basic written infrastructure of both the local and wide area networks we are to build for them, being such an early stage this document is subject to change. This design includes the infrastructure for the corporate headquarters located in San Francisco, as well as the other design centers in Detroit, Paris, Tokyo, and Sao Paulo. We then follow up by explaining the infrastructure of the sales offices, which may not require as high grade of equipment as the design centers depending on its requirements. Finishing with the overview of the entire wide area network, connecting each site to the corporate headquarters which is where we will begin our design. The corporate office being the main headquarters will include many services such as file, print, email, directory, and application. These services will be separated onto at least two different servers due to the constant strain we may see from directory and email services. If necessary we will implement an application server as well to run any in-house programs the company may be familiar with. We also suggest the use of a database server dedicated to storing...

Words: 5812 - Pages: 24

Free Essay

Paper

... tablets and other mobile devices, the people are going more mobile. With use of smart phones, everybody is accessing their email accounts and contacts. With the use of some remote access tools, we should be able to access our desktop remotely in our mobile device and access from anywhere. Even for the accounting, the QuickBooks apps generated by intuit would help in maintaining the book. Even the payroll of the company can also be done using mobile devices. The major disadvantage would be the security, because if we lose the mobile devices, there is more chance for somebody to easily hack the information. The term cloud computing stems from the conceptual way the Internet is drawn, specifically as a cloud. Cloud computing is a way of explaining that users are no longer constrained or aware of where the services they are using reside. Both application and databases are moving from being hosted by the particular company to being outsourced to companies that can take entire enterprise applications and make them available to users via a browser. Yes my company uses cloud computing. It is Amazon network based Cloud computing. Our headquarters is located in Houston and we have a branch location in Louisiana. The cloud computing is very beneficial in sharing the documents and all other transactions. Even the softwares we use are developed to work with cloud computing. So it saves lot of time and labor. The only problem I see with our cloud computing is the price and internet speed...

Words: 4518 - Pages: 19

Premium Essay

Ntc/406 Wwek 2 Individual

...Applications Protocol Paper-VoIP security NTC/406 Explains how the application layer manages distributed applications and their protocols  Here in Afghanistan we use Voice over Internet Protocol (VoIP) for our NIPR, SIPR and CENTRIX voice capabilities. We utilize the Cisco MCS 7835 Media Convergence Server which allows for any user with internet access to create and receive calls of varies types.Because of this method of communications, it too is also targeted for attacks by unauthorized access, sniffing, and data capturing techniques. To reduce the exposure of this transmission, policies and protocol should be implemented. VoIP is a protocol with the means of communication that originates from local area network domain and provides the essential functions for audio and visual of live streaming transmission. To ensure reliability and security of these connections, information technology personal will need to address the known issues related to this domain. The Local Area Network is one of seven domains situated within the network and provides the crucial link to interior and exterior connections for accessing information. To address these security issues, we must first consider the known threat, risk, and vulnerabilities associated with this domain and connection type. Voice over internet protocol transfers packets over the network by utilizing the Public Branch Exchange (PBX) and Public Switch Telephone Network or PSTN. This function...

Words: 777 - Pages: 4

Premium Essay

Strategic Planning Part I

...with information technology and security needs. However, our focus is our ongoing security and supporting roles for companies who use voice over internet protocol or VOIP services. A recent article in PC Magazine explains that “issues get worse with VOIP calls, which have all of the security issues of the Internet and personal computing. If the person you're calling has a conventional phone line, you've got both kinds of security threats” (Spector, p. 1). As the technology for VOIP expands more cybercriminals will attempt to steal any bit of information that they feel my be profitable if sold to another firm or used by the criminal enterprise in course of a day. Spector continues from page two stating “the digital data of a VOIP call can be intercepted anywhere along the complicated path from your router through the multiple servers until it goes out to the analog phone network. Assuming your VOIP service doesn't encrypt calls, whoever intercepts it can listen to it… (Spector, p. 2)” Model, Inc. started as a small local network repair company until landing an account with Chase Bank in Arizona 10 years ago that changed everything. Mr. Model created the firm using his values and ethics and as time went by the compliance department changed a few policies but Integrity has been and always will be the most important character trait that Mr. Model wanted to instill in his company and employees. By employing the latest technologies and securities to the networks we protect a quick...

Words: 1101 - Pages: 5

Premium Essay

Fi504 Final Essay Questions

...(TCO G) 1. Determine the basic concept of responsibility, accountability, and liability as applied to ethical decisions. How these concepts related? (25 points) Answer: BASIC CONCEPTS: RESPONSIBILITY, ACCOUNTABILITY, AND LIABILITY Ethical choices are decisions made by individuals who are responsible for the consequences of their actions. Responsibility is a key element of ethical action. Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make. Accountability is a feature of systems and social institutions: It means that mechanisms are in place to determine who took responsible action, and who is responsible. Systems and institutions in which it is impossible to find out who took what action are inherently incapable of ethical analysis or ethical action. Liability extends the concept of responsibility further to the area of laws. Liability is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. Due process is a related feature of law-governed societies and is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly. These basic concepts form the underpinning of an ethical analysis of information systems and those who manage them. First, information technologies are filtered through social institutions, organizations...

Words: 2501 - Pages: 11

Premium Essay

Cloud Computing

...White Paper: Introduction to cloud computing The boom in cloud computing over the past few years has led to a situation that is common to many innovations and new technologies: many have heard of it, but far fewer actually understand what it is and, more importantly, how it can benefit them. This whitepaper will attempt to clarify these issues by offering a comprehensive definition of cloud computing, and the business benefits it can bring. In an attempt to gain a competitive edge, businesses are increasingly looking for new and innovative ways to cut costs while maximising value – especially now, during a global economic downturn. They recognise that they need to grow, but are simultaneously under pressure to save money. This has forced the realisation that new ideas and methods may produce better results than the tried and tested formulas of yesteryear. It is the growing acceptance of innovative technologies that has seen cloud computing become the biggest buzzword in IT. However, before an organisation decides to make the jump to the cloud, it is important to understand what, why, how and from whom. Not all cloud computing providers are the same. The range and quality of services on offer varies tremendously, so we recommend that you investigate the market thoroughly, with a clearly defined set of requirements in mind. Rob Lovell, CEO ThinkGrid What is ‘cloud computing’? Many people are confused as to exactly what cloud computing is, especially as the term can be...

Words: 3253 - Pages: 14