Voip Security Mistakes And Solutions

VoIP is simply data transmitted in digital packet form. This means it can be attacked, hacked, intercepted, manipulated, re-routed and degraded just like packets on the data network. Many attacks focus on :
      -VoIP terminal, Operating system , Internet protocols, applications
      -a lot of denial of service (DoS) attacks. shutting down the second company's phone systems
      -Toll Fraud(Service Theft)
      -Eavesdropping


Here are a few things that you could do to enhance your VoIP security:
1)-Use Strong Passwords(security Passwords ):Your passwords are the first targets of hackers and data thieves,If somebody gets your passwords that person can do everything that you can do :-make calls on your VoIP account,-withdraw money from your online bank account or apply for credit card in your name.....
Therefore it is highly essential that you use passwords that are hard to hack:
1-create a secure password :
     -No Personal Information:Never choose a password that contain your  name, the names of your spouse ,your pets....
      -Mix Character Types:For example"yghAV@SS15Dqs"
-use both upper and lower case letters
-use some numbers and special characters: (i.e. ` ~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] \ : " ; ' < > ? , . / 123456789).
     -Whenever possible, use at least 14 characters or more
2-Protect your passwords from prying eyes
3-Change passwords regularly
2)-Encryptions:While there is some debate about the threat level that eavesdropping poses to VoIP, companies should consider using encryption to secure their VoIP calls.it is a basic way to protect traffic stream in an unsafe communication channel. Its purpose is to allow protect VoIP stream from unauthorized reading. Only legitimate end-users and necessary communication nodes, like proxies are allowed to see it.
3)-Use A Firewall :A VoIP firewall is an application driven by a security policy defining whether to allow or deny certain calls.it  controls incoming and outgoing traffic on end-device. It blocks application ports that are unnecessary for the end-device. It also checks and authorizes applications communicating with the network. Firewall monitors the traffic in order to detect and block unauthorized access or transmission.
4)-Use  AntiViruses,spyware remover .......:
-AntiViruses: searches and scans for known viruses in order to detect and disable them ,which obviously needs to be regularly updated.
-spyware remover: It detects and removes spyingsoftware – malicious software that monitors activities performed on the computer and transfers this information to some unauthorized user.                                                        
5)-Separate voice and data networks: Enterprises should deploy the voice traffic on a separate virtual LAN, or VLAN, from the data traffic. and place them behind separate firewalls This helps protect the voice service In case of attacks .

Related post



Newer Post Older Post

0 comments:

Post a Comment

 

Wiki Voip And Fax Tutorials Copyright © 2010 Labloub