TITLE

DNS, Worms Threaten VoIP

AUTHOR(S)
R. S.
PUB. DATE
September 2006
SOURCE
Bank Technology News;Sep2006 Supplement, Vol. 19, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the importance of enterprise network, from Voice-over Internet Protocol (VoIP)-ready firewalls to secure Internet telephony in the U.S. It has cited that VoIP system could be securing Exchange Bank's existing network security appliance. Theft of service, forced disconnects, false message light indicators and low voice quality are the biggest issues for institutions with converged voice and data networks.
ACCESSION #
22385223

 

Related Articles

  • VoIP vulnerability requires different security methods. Warren, Craig // Communications News;Nov2001, Vol. 38 Issue 11, p50 

    Discusses the security methods aimed to address the vulnerability of the voice-over-Internet protocol (VoIP) networks to hackers and denial-of-service attacks. Tasks of an enterprise network firewall; Hardware elements of an ideal firewall system; How the signaling elements of a VoIP network work.

  • Form a New Line of Defense. L. E. // InfoWorld;10/17/2005, Vol. 27 Issue 42, p42 

    This article suggests the need of enterprise VoIP to adapt to security challenges. Most present-day VoIP systems run on the internal local area network (LAN) only, interfacing with the outside world via VoIP gateways and public switched telephone network (PSTN) trunks. However, that is likely to...

  • The Challenge of VoIP Security. Pabrai, Uday O. Ali // Certification Magazine;Nov2004, Vol. 6 Issue 11, p34 

    This article discusses the challenges to security in Voice over Internet Protocol (VoIP) technology. VoIP is about carrying voice calls over an Internet Protocol (IP) network. It results in the digitization and packetization of voice streams. Both performance and security are significant...

  • ICE helps VoIP traverse firewalls. Ward, Michael // Network World;8/1/2005, Vol. 22 Issue 30, p33 

    The IETF MMUSIC working group has developed the Interactive Connectivity Establishment (ICE) draft which provides a framework to unify the various NAT firewall traversal techniques that will enable SIP-based voice over Internet telephony (IP) clients to successfully traverse the variety of...

  • Think inside the box. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);Apr2009, p39 

    This article discusses a computer architecture called unified threat management (UTM). According to the article, the main UTM architecture combines a firewall, anti-virus and anti-spyware. It indicates some features added to UTM devices, including Transport Layer Security (TLS), virtual private...

  • We fixed the glitch.  // Australian Personal Computer;Apr2005, Vol. 25 Issue 4, p17 

    The article presents information on a little issue with the Windows firewall that could result in unintentional public file sharing. In this case, Microsoft Corp. inadvertently failed to firewall dialup connections in XP SP2.

  • ALTIGEN UPGRADES VOIP SECURITY WITH FORTINET'S FIREWALL.  // Computer Workstations;Oct2003, p9 

    The U.S.-based AltiGen Communications Inc., a provider of IP-PBX telephone phone systems and call center solutions, has enhanced its network security and maintained compatibility with its high-quality Voice over IP infrastructure by upgrading its network security to the FortiGate Antivirus...

  • Skype gives IT managers pause. Solheim, Shelley // eWeek;11/21/2005, Vol. 22 Issue 46, p13 

    The article reports that officials at Skype Technologies SA, maker of the popular VOIP (voice over IP) tool, admit that their technology is not designed to be an enterprise-grade tool and say that IT administrators are free to block its use if they are concerned. Among the security concerns is...

  • The trade-off. Rothschild, Michael // Communications News;Sep2004, Vol. 41 Issue 9, p19 

    This article focuses on various technological challenges faced by companies in the U.S., as of 2004. Companies in a variety of vertical markets are now faced with working in a unique business climate unlike anything experienced in the past. Likewise, more and more business processes and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics