TITLE

Return of the Phone Phreakers: Business Communications Security in the Age of IP

AUTHOR(S)
Boone, Adam
PUB. DATE
April 2011
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2011, Vol. 48 Issue 4, p50
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the security risks of Internet Protocol (IP)-based communications particularly SIP trunks and Voice-over-IP (VoIP). It says that unsecured VoIP systems and SIP trunks can be attacked by phone phreakers who can gain access to the system in any country in the world and exploit weak security in any company's telecommunication systems. It discusses four basic VoIP security requirements including privacy, real-time policy enforcement and access control and user authentication.
ACCESSION #
59858798

 

Related Articles

  • Stealing Minutes. Sutherland, Benjamin // Newsweek (Atlantic Edition);3/19/2007 (Atlantic Edition), Vol. 149 Issue 12, p12 

    This article discusses the security problem within the Internet telecommunication business. Most large businesses use voice over Internet protocol (VoIP). VoIP users are falling prey to "phreakers," who steal minutes and then resell them in a thriving black market. For telecoms, the profit is in...

  • Stealing Minutes. Sutherland, Benjamin // Newsweek (Pacific Edition);3/19/2007 (Pacific Edition), Vol. 149 Issue 12, p6 

    This article discusses the security problem within the Internet telecommunication business. Most large businesses use voice over Internet protocol (VoIP). VoIP users are falling prey to "phreakers," who steal minutes and then resell them in a thriving black market. For telecoms, the profit is in...

  • Evaluating Potential Security Issues with VoIP Communications.  // Bank Security Report;Jan2012, Vol. 41 Issue 1, p2 

    The article assesses how potential security risks in the effort to improve call quality using voice-over Internet Protocol (VoIP) as mode of communication are possible. A study conducted at New York University confirmed that enhancing the VoIP call quality means exposing users' IP addresses and...

  • SIPERA VIPER SERVICES ANALYSE/ASSESS/TEST VOIP/UC NETWORKS.  // Tele-Service News;Oct2007, Vol. 19 Issue 10, p6 

    The article reports on the launch by Sipera Systems of its Sipera Viper Services. Sipera Viper allows Voice over Internet Protocol (VoIP) service providers to analyze, assess and test their networks and efficiently apply specific security measures. The components of the services include...

  • SECURE IP VOICE. Flynn, Kevin // Communications News;Feb2007, Vol. 44 Issue 2, p38 

    The article suggests ways to approach and implement IP voice security. Primarily, take advantage of the security capabilities that you have already built into the network infrastructure and limit the amount of processor and link resources that can be consumed by a given protocol. The author...

  • VoIP security is set to become one of the top issues of the year, claim experts, as businesses and consumers are attracted by lower voice call charges.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2007, p10 

    The article addresses the possible threats to voice-over Internet protocol (VoIP) security in 2007. As VoIP penetration grows, so VoIP security threats will become more prevalent. According to analysts, many business Internet protocol networks will have to be toughened to cope with VoIP, where...

  • Black Hat probes hacker exploits. Messmer, Ellen // Network World;8/6/2007, Vol. 24 Issue 30, p12 

    Information about several topics discussed at the Black Hat Conference focusing on security weaknesses of everything from Voice over Internet protocol (VoIP) held at Caesar's Palace in Las Vegas, Nevada is presented. Among the hot topics addressed include VoIP security flaws, virtualization...

  • Analysis of information leakage from encrypted Skype conversations. Dupasquier, BenoĆ®t; Burschka, Stefan; McLaughlin, Kieran; Sezer, Sakir // International Journal of Information Security;Oct2010, Vol. 9 Issue 5, p313 

    Voice over IP (VoIP) has experienced a tremendous growth over the last few years and is now widely used among the population and for business purposes. The security of such VoIP systems is often assumed, creating a false sense of privacy. This paper investigates in detail the leakage of...

  • Hype vs. reality in VoIP security.  // Network World;2/5/2007, Vol. 24 Issue 5, p20 

    The article presents interviews with Lawrence Orans, a research director in Gartner's Research organization, and Frank Dzubeck, president of Communications Network Architects. When asked about the severity of security threats to voice over Internet protocol (VOIP) systems, Orans refers to the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics