To read this content please select one of the options below:

Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples

Theodore Tryfonas (University of Glamorgan, Pontypridd, UK)
Iain Sutherland (University of Glamorgan, Pontypridd, UK)
Ioannis Pompogiatzis (COSMOTE SA, Greece)

Internet Research

ISSN: 1066-2243

Article publication date: 6 February 2007

2135

Abstract

Purpose

The purpose of this paper is to discuss and amalgamate information security principles, and legal and ethical concerns that surround security testing and components of generic security testing methodologies that can be applied to Voice over Internet Protocol (VoIP), in order to form an audit methodology that specifically addresses the needs of this technology.

Design/methodology/approach

Information security principles, legal and ethical concerns are amalgamated that surround security testing and components of generic security testing methodologies that can be applied to VoIP. A simple model is created of a business infrastructure (core network) for the delivery of enterprise VoIP services and the selected tests are applied through a methodically structured action plan.

Findings

The main output of this paper is a, documented in detail, testing plan (audit programme) for the security review of a core VoIP enterprise network infrastructure. Also, a list of recommendations for good testing practice based on the testing experience and derived through the phase of the methodology evaluation stage.

Research limitations/implications

The methodology in the paper does not extend at the moment to the testing of the business operation issues of VoIP telephony, such as revenue assurance or toll fraud detection.

Practical implications

This approach facilitates the conduct or security reviews and auditing in a VoIP infrastructure.

Originality/value

VoIP requires appropriate security testing before its deployment in a commercial environment. A key factor is the security of the underlying data network. If the business value of adopting VoIP is considered then the potential impact of a related security incident becomes clear. This highlights the need for a coherent security framework that includes means for security reviews, risk assessments, and influencing design and deployment. In this respect, this approach can meet this requirement.

Keywords

Citation

Tryfonas, T., Sutherland, I. and Pompogiatzis, I. (2007), "Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples", Internet Research, Vol. 17 No. 1, pp. 61-87. https://doi.org/10.1108/10662240710730506

Publisher

:

Emerald Group Publishing Limited

Copyright © 2007, Emerald Group Publishing Limited

Related articles