Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » VOIP » Article
 

Is Your VOIP Service Secure?




By Ron King

For individuals, VOIP security is primarily a matter of preventing others from eavesdropping on their conversations. Some VOIP service providers offer voice security through encryption or separate data routes.

Regular precautions for transferring files should, of course, always be followed. A firewall should be in place for protecting your computer from the internet and any data or program that is downloaded should be checked for viruses.

But users should reealize that VOIP hardware devices are inherently more vulnerable to attack. Some types of equipment can be made unstable or inoperable when they receive certain types of data. Some internet phones are also susceptible to data piracy, revealing private information under certain conditions.

While this probably won't be of much concern when you're calling Uncle Tim, it is a huge concern for businesses that consistently use telephone communication for discussing sensitive business information. As VOIP popularity increases, security is becoming a growing concern and is now receiving widespread attention.

Security Issues

It's mainly businesses that need to be concerned with security issues related to VOIP. They are more susceptible to the Denial of Service (DOS) attacks and other forms of obnoxious hacking because many businesses operate personal gateways and other equipment for connecting to the internet.

There are several security issues associated with VOIP. Eavesdropping is an understandable fear with both regular and VOIP calls, but there are additional concerns unique to this technology. Since VOIP data is traveling across the internet just like any other kind of data, it is vulnerable to the same types of attacks. Hackers have countless software tools available to them to retrieve information being transmitted over the internet. These tools are as effective with voice data as with any other kind of data.

Another security threat is the possibility of sending viruses with VOIP data. This hasn't surfaced yet, but viruses could potentially overload VOIP networks, reduced sound quality and create delays.

VOIP isn't secure against spam either. This refers to receiving unsolicited marketing calls from companies selling their goods and services.

There are several points in the transmission of VOIP calls that hackers can use to recover information. In addition to retrieving actual conversations, they can also access critical information such as user identities and VOIP phone numbers. With this information, a hacker can place phone calls using someone else's identity.

Attackers could also record phone calls while eavesdropping on conversations and even potentially restructure voice data to create discussions that never actually existed! Log files could also be accessed and altered.

There are ways currently available that address such security issues. The first is with encryption that provides the same sort of security used in sending credit card information over a secure data connection. The second is to separate VOIP data from other internet traffic by using a Virtual Local Area Network (VLAN). Both methods can degrade call quality, but they present an alternative for sensitive calls.


 
 
About the Author
Visit http://www.voip-solutions-now.com to learn more. Ron King is a full-time researcher, writer, and web developer. Copyright 2005 Ron King. This article may be reprinted if the resource box is left intact.

Article Source: http://www.simplysearch4it.com/article/14934.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/14934.html" as shown above and make it hyperlinked.



  Some other articles by Ron King
FDA Approves Lasik Eye Surgery
The Food and Drug Administration (FDA) approved a new custom lasik procedure in September of 2005. This new procedure can now treat many patients who were previously ineligible for the surgery. Nearsightedness Nearsightedness ...

Building An Outside Deck
One of the most beautiful additions to any home is a deck. Not only does it add beauty, a deck also adds value to your home. ...

Make A Good First Impression: Landscape Your Driveway
Is your driveway landscaped? It should be. This includes the driveway itself, as well as the design elements on ...

College Basketball Jerseys: Don't Just Show Your Support -- Wear It!
Among the most highly prized possessions that any college basketball player can hope for is their college basketball jersey. The college basketball ...

Basics Of Home Buying
The most important investment you will ever make is probably the purchase of a home. Finding the right home for you can be a ...

The 7 Schools Of Feng Shui
Everyone has heard of Feng Shui, but what exactly is it? Feng Shui is an ancient Chinese belief that involves the study of both the natural and the created environments. To achieve a balance between the ...

  
  Recent Articles
Why choose an Internet phone service?
by Rick Martin

Outsourcing to Cut Costs
by Storm Telecom

VoIP for Business
by Midland Communications

Cheap telephone calls with broadband phone services
by Clint Jhonson

Business VoIP for better management
by Ajay singh

Use of Videoconferencing Services for Home and Business Users
by Steen Finsen

VoIP tutorial: Acquainting you to the real communication revolution
by John

How VoIP companies dominate the communication platform
by Ajay singh

If you want cheap VoIP services then switch over to Skype VoIP
by John

Why should you get a Vonage VoIP?
by Dharam

Understanding VoIP security
by Anupam Agnihotri

Hands on with the underlying power and potential of the VoIP technology
by Dharam

Can't connect to database