Premium Essay

Nt1330 Unit 3 Case 4.1

Submitted By
Words 1263
Pages 6
The very nature of VoIP telephone calls being transmitted over the internet means that they are vulnerable to the same threats as other online data services. The use of VoIP telephones presents five prime areas of concern regarding security and they are described as follows:

4.1 Toll Fraud

Toll fraud is an attempt by a hacker to gain unlawful remote access to a VoIP telephone system, usually through an open IP or SIP (Session Initiation Protocol) port. Successful attacks result in the hacker being able to make calls to premium numbers at the expense of the company.

A toll fraud attack could potentially leave the company with an expensive telephone bill if the attack goes undetected. There are, however, measures which can be taken to try and prevent toll fraud attacks. Password protection is the first line of defence and a strong password consisting of numerals, capitals and lowercase letters is recommended. Staff should be trained to use secure passwords and ensure that they are changed regularly. The VoIP system should always be behind a firewall and encryption of voice data is also highly recommended. …show more content…
The quality of a call can degrade significantly if IP voice packets are lost or suffer delays at any given time during a call between the VoIP users (Das, 2016). The next generation of VoIP technology is set to use IPv6 infrastructure which will ensure quality of service. IPv6 achieves this quality of service by use of classification and marking of data packets, ensuring a reliable VoIP infrastructure (Das, 2016). As VoIP grows ever more popular, the limitations of IPv4 address space will hinder its expansion. IPv6 provides a solution to this problem by allowing vastly more unique IP addresses as well as built-in encryption making it much safer than IPv4 based

Similar Documents

Premium Essay

Test

...Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10