New phone technologies bring security issues

Leclair, Lee
March 2008
Inside Tucson Business;3/17/2008, Vol. 17 Issue 41, p7
The article provides information on the aspects of security and performance of several phone technologies including Voice Over Internet Protocol (VOIP). The system provides high-quality low-latency performance using circuits that are dedicated once they are established in making the call. It cites that phone technology offers security benefits since it is largely purpose-built and has been traditionally separated from data networks.


Related Articles

  • Four techniques that will become essential for securing growing IP-enabled networks. Roese, John // Computer Weekly;10/26/2004, p70 

    The article reports that Internet Telephony (IP) devices are creating a network architecture that demands better security. From IP-enabled phones to IP inventory systems based on radio frequency identification technology, the possibilities are limitless, and it is crucial that an enterprise's...

  • VoIP: opportunities and challenges.  // Computer Weekly;6/17/2008, p36 

    The article offers the author's suggestions regarding use of Voice over Internet Protocol (VoIP) in businesses. The author says IT managers responsible for managing a VoIP deployment should be aware that moving telephony to a data network means voice services will inherit any security issues...

  • Network Renovation.  // Business Communications Review;Aug2006, Vol. 36 Issue 8, p2 

    The author reflects on renovating an enterprise network to Internet Protocol (IP)-telephony and convergence. He made mention on reviewing a presentation for VoiceCon Fall, where he learned the importance of planning details. He stated that replacing a TDM PBX with IP-telephony requires thinking...

  • Questioning IPv6 Security. DeNardis, Laura // Business Communications Review;Jul2006, Vol. 36 Issue 7, p51 

    The article examines IPv6 security. The commonly cited rationale for upgrading to IPv6 is the idea that the newer Internet Protocol provides vastly improved security over IPv4. Emphasis has been given on how conceptions of IPv6 as more secure than IPv4 are somewhat misleading and how...

  • An IP telephony roadmap. Ayotte, Karen; Vaughan, Kirk // Communications News;Feb2005, Vol. 42 Issue 2, p18 

    This section provides a checklist for effectively launching integrated voice and data networks. As of February 2005, many companies still fret over such issues as security, voice quality and the impact to core network and application performance. They also question whether they have the staff,...

  • Voice over IP: finding a balance between flexible access and risk of external attack. Shepherd, Ian // Computer Weekly;4/19/2005, p34 

    The article discusses recent developments in Internet telephony. The author argues that it is a simple truth that any new technology tends to develop faster in terms of performance and functionality than it does in terms of security. Good examples are Wi-Fi, mobile phones and widespread use of...

  • ASK PROFESSOR PHIL. Hippensteel, Phil // AV Technology;Jan2014, Vol. 7 Issue 1, p14 

    The article presents question and answer concerning the issue on Voice over Internet Protocol (VoIP) that uses real-time protocol (RTP), which is noted that does not work well with firewalls, but seems to pass through company firewalls.

  • DNS, Worms Threaten VoIP. R. S. // Bank Technology News;Sep2006 Supplement, Vol. 19, p12 

    The article focuses on the importance of enterprise network, from Voice-over Internet Protocol (VoIP)-ready firewalls to secure Internet telephony in the U.S. It has cited that VoIP system could be securing Exchange Bank's existing network security appliance. Theft of service, forced...

  • Black Hat: Cisco to be under scrutiny again. McMillan, Robert // Network World;7/24/2006, Vol. 23 Issue 28, p16 

    The article examines Cisco System Inc.'s products to be showcased at the Black Hat USA conference in Las Vegas, Nevada. The discussion would start on the discovery of 15 exploits which includes two that aimed at Network Admission Control and Voice-over Internet Protocol (VoIP) weaknesses. In...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics