return to ICG Spaces home    ICG Risk Blog    discussions    newsletters    login    

ICG Risk Blog - [ VoIP telephony as susceptible to hacking as pure data networks ]

VoIP telephony as susceptible to hacking as pure data networks


Attacks: DDoS (distributed denial-of-service attack), packet reconstruction, and OS attacks from within and without the company.

The only difference is that VoIP hacks are presently few in number but that will change dramatically as the technology builds a critical mass in terms of installed base or critical path users.

The critical first step is to separate voice and data networks with virtual local-area networks (VLANs) to prevent a DDoS attack against your corporate data website from taking down your VoIP network, or vice versa. Reduced costs will not justify the loss of both voice and data should your business's sole connection to the Internet go down.

Then comes encryption (you were going to do that, correct?), switches over hubs, hardwired over software-based phone solutions (much more resistant to hacks), protocol-specific IT expertise, and then the many standard needs of physical access control, firewalls, proxies, antiviral, and backups.

There are solutions but they are not as cheap as a phone line for small(er) businesses if these security needs are factored in. Without the security handling, VoIP is a sitting duck for the taking.

How your phone could be hacked
By Robert Vamosi: Senior Associate Editor, Reviews
Friday, April 23, 2004

Gordon Housworth

Cybersecurity Public  InfoT Public  


  discuss this article

<<  |  September 2019  |  >>
view our rss feed