IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Strategy for Enterprise VoIP Security

A Strategy for Enterprise VoIP Security
View Sample PDF
Author(s): Dwayne Stevens (Community Trust Bank, USA)and David T. Green (Governors State University, USA)
Copyright: 2010
Pages: 10
Source title: Networking and Telecommunications: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-60566-986-1.ch093

Purchase

View A Strategy for Enterprise VoIP Security on the publisher's website for pricing and purchasing information.

Abstract

Voice over Internet Protocol (VoIP) networks signal an evolution in telecommunications that is accelerating the convergence of the Internet and the public switched telephone network (PSTN). Offering decreased costs and other benefits, VoIP is poised to transform telecommunications and the organizations that use them. However, some consider VoIP a security nightmare, combining the worst vulnerabilities of IP networks and voice networks. DOS attacks, crash attacks, packet spoofing, buffer overflow attacks, spam over Internet telephony (SPIT), and word injection all pose threats to commercial enterprise networks and the mission critical operations that they support.

Related Content

S. Vijay Anand, Sathis Kumar B.. © 2023. 12 pages.
Sudarson Rama Perumal, Muthumanikandan V., Sushmitha J.. © 2023. 30 pages.
Sipra Swain, Biswa Ranjan Senapati, Pabitra Mohan Khilar. © 2023. 31 pages.
Uma Mageswari R., Nallarasu Krishnan, Mohammed Sirajudeen Yoosuf, Murugan K., Sankar Ram C.. © 2023. 20 pages.
Divya L., Pradeep Kumar T. S.. © 2023. 15 pages.
Pradeep Kumar T. S., Vetrivelan P.. © 2023. 15 pages.
Vanitha Veerasamy, Rajathi Natarajan. © 2023. 16 pages.
Body Bottom