ABSTRACT
Information Security has emerged as one of the biggest concerns that network administrators and other stakeholders face today. Most data custodians face Information Security risks on a daily basis; thus, it is up to Information Security professionals to research these threats and exploits to secure private information from unauthorized access and mismanagement. It can be easily stated that familiarity with a particular technology can be helpful in securing information. It can also be stated that new and emerging technologies are harder to secure, but not impossible.
This paper will consider and focus on both technical and legal aspects, and approaches on how to secure Voice over Internet Protocol (VoIP) Data Network's facility to facility traffic in particular. Both technical and legal aspects are important in protecting VoIP Networks. This paper will take the following approach: The History of VoIP and short comings, Security Issues of VoIP (current gaps), Current Solutions for the current security issues, Future Solutions for VoIP security and Future concerns more specifically the passing of Communications Assistance to Law Enforcement Act (CALEA) and its impact on VoIP security.
- Frequently Asked Questions. (2007). Federal Communications Commission. Retrieved February 9, 2007 from http://www.fcc.gov/voip/Google Scholar
- Internet Security Systems, Ahead of the Threat. VoIP: The Evolving Solution and the Evolving Threat. Retrieved February 15, 2007 from http://www.iss.net/documents/whitepapers/ISS_VoIP_White_paper.pdfGoogle Scholar
- IPSec. (2007). Webopedia. Retrieved February 9, 2007 fromhttp://www.webopedia.com/TERM/I/IPSec.htmlGoogle Scholar
- IP Sec Protocol Overview. (2007) Freesoft.com. Retrieved February 15, 2007 from http://www.freesoft.org/CIE/Topics/141.htmGoogle Scholar
- The History of VoIP. (2005). WhichVoIP.com. Retrieved February 9, 2007 http://www.whichvoip.com/voip/articles/voip_history.htmGoogle Scholar
- Telecom Policy Report. (2005). The FCC and CALEA: What Price Collaboration? Retrieved March 27, 2007 from http://findarticles.com/p/articles/mi_m0PJR/is_2005_Dec_5a i_n15896054Google Scholar
- VoIP spam from SearchVoIP.com. (2007). SearchVoIP.com. Retrieved February 9, 2007 from http://searchvoip.techtarget.com/sDefinition/0,290660,sid66_gci1024458,00.htmlGoogle Scholar
- VOIP Toll Fraud. (2007). VoIP-news. Retrieved February 9, 2007 from http://www.voip-news.com/voip-infowiki/index.php/VoIP_toll_fraudGoogle Scholar
- Aginsky, A. (1995). Focus on: How to combat toll fraud Retrieved February 15, 2007 from http://www.findarticles.com/p/articles/mi_qa3629/is_199511/ai_n8728125Google Scholar
- Curran, P. Just how risky is a phone call over the Internet. Retrieved February 13, 2007 from http://www.microsoft.com/uk/business/security/VoIP.mspxGoogle Scholar
- Dzucbeck, F. (2007). Hype vs. reality in VoIP security.Google Scholar
- Retrieved February 15, 2007 form NetworkWorld.com Materna, B. (2006). VoIP Security Hacking HighlightsGoogle Scholar
- Need for Proactive Solutions. Retrieved March 2, 2007 from http://www.tmcnet.com/channels/voip/articles/1546-voip-security-hack-highlights-need-proactive-solutions.htmGoogle Scholar
- Rosenberg, J. (2006). Secure caller ID for VoIP. Retrieved February 15, 2007 from NetworkWorld, November 27, 2006. Vol23, Num 46. www.networkworld.comGoogle Scholar
- Sathish, P. (2006). VoIP Security Challenges: 25 Ways to Secure your VoIP Network. Retrieved February 11, 2007 from http://www.voiplowdown.com/2006/12/voip_security_c.htmlGoogle Scholar
- Greene, T. (2006). Net pioneers sound security alarm over VoIP wiretaps. Retrieved March 2, 2007 from http://www.networkworld.com/news/2006/061906-caleavoip.htmlGoogle Scholar
- Draven, J. (2007). VoIP Phones and their Downsides http://www.voiceoverip-articles.com/voip-products/voip-phones-and-their-downsides/Google Scholar
Index Terms
- Network security: VoIP security on data network--a guide
Recommendations
Network and database security: regulatory compliance, network, and database security--a unified process and goal
InfoSecCD '07: Proceedings of the 4th annual conference on Information security curriculum developmentDatabase security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused ...
The management of economic ramification of information and network security on an organization
InfoSecCD '07: Proceedings of the 4th annual conference on Information security curriculum developmentAlthough information security is becoming more complex everyday, many organizations' security systems are failing, with serious results. More and more organizations are experiencing an increase in threats to computer systems and networks and the damage ...
A VoIP system for mobility voice security support using the VPN
Voice over internet protocol (VoIP) provided voice service using Internet. It receives footlights when it escapes an initial curiosity. Interest to VoIP increased, because it can transfer existing phone service and deliver voice data through Internet ...
Comments