Top rated VoIP security tips of 2007

Jessica Dempsey
We created them, but you made them stars. These are our top-rated tips of the year, as voted by you. With hackers' methods getting more intricate and sophisticated by the day, how can you make sure your network stays relatively hassle-free when it comes to protection and security? Check out our three superstar tips and let us know how you deal with VoIP security issues.

    Requires Free Membership to View

Manipulating VoIP security
In this tip you will discover an extensive list of sites that track and document attack tools that attempt packet flooding and signal manipulation. This is the third tip in a series of three by Gary Audin that give you free tools to deal with everything from sniffing and manipulating the packet stream, and IP Telephony fuzzing. These three tips cover many of the forms of attacks and malicious behavior that have so far been created. There are also scanning, enumeration and miscellaneous tools as well as commercial development tools that are available. As VoIP becomes more pervasive and the number of individuals using VoIP increases, so will the attack tools. Keep checking the sites mentioned in these tips for further additions to the attack tools list.

VoIP security -- problems inherited from data networking
VoIP security problems present a challenge for voice and network staff because IP telephony brings with it not only the security problems of data networks but also new, added threats specific to VoIP. In this tip, learn about the data network security threats that your voice staff must confront, how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel.

VoIP/IP Telephony vendor security solutions
VoIP and IP Telephony system vendors have been improving their security offerings, but are they good enough for your VoIP implementation? Learn about the various security solutions you can implement in your VoIP network to help protect you against attacks and security issues with this tip from Gary Audin. Audin cites an article from the January 2006 issue of Business Communications Review in which the authors conducted a series of security tests on different VoIP vendors' product offerings, and then scored them on performance. See how your own network measures up!

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: