return to ICG Spaces home    ICG Risk Blog    discussions    newsletters    login    

ICG Risk Blog - [ VoIP telephony as susceptible to hacking as pure data networks ]

VoIP telephony as susceptible to hacking as pure data networks

  #

Attacks: DDoS (distributed denial-of-service attack), packet reconstruction, and OS attacks from within and without the company.

The only difference is that VoIP hacks are presently few in number but that will change dramatically as the technology builds a critical mass in terms of installed base or critical path users.

The critical first step is to separate voice and data networks with virtual local-area networks (VLANs) to prevent a DDoS attack against your corporate data website from taking down your VoIP network, or vice versa. Reduced costs will not justify the loss of both voice and data should your business's sole connection to the Internet go down.

Then comes encryption (you were going to do that, correct?), switches over hubs, hardwired over software-based phone solutions (much more resistant to hacks), protocol-specific IT expertise, and then the many standard needs of physical access control, firewalls, proxies, antiviral, and backups.

There are solutions but they are not as cheap as a phone line for small(er) businesses if these security needs are factored in. Without the security handling, VoIP is a sitting duck for the taking.

How your phone could be hacked
By Robert Vamosi: Senior Associate Editor, Reviews
Friday, April 23, 2004

Gordon Housworth



Cybersecurity Public  InfoT Public  

discussion

  discuss this article


<<  |  September 2019  |  >>
SunMonTueWedThuFriSat
1234567
891011121314
15161718192021
22232425262728
293012345
6789101112
view our rss feed