Security Considerations for Voice Over IP Systems (PDF 99P)
Security Considerations for Voice Over IP Systems (PDF 99P)
Security Considerations for Voice Over IP Systems (PDF 99P)
This document is published by National
Institute of Standards and Technology, this covers the following: Overview of
VOIP, VOIP Equipment, Quality of Service Issues, Overview of VOIP Data
Handling ,Cost, Privacy and Legal Issues with VOIP, VOIP Security
Issues,Speed and Quality, H.323, SIP Gateway Decomposition,
Firewalls, Address Translation, and Call Establishment, Encryption and
IPsec, Solutions to the VOIPsec Issues, Planning for VOIP
Deployment, VOIP Risks, Threats, and Vulnerabilities.
Author(s): D. Richard Kuhn,
Thomas J. Walsh, Steffen Fries
This note covers the following topics: protocol
overview, components, H.225, RAS , Q.931, H 235V2 security, H 323 & firewalls,
sccpskinny, RTP and RTCP,SIP, sample sip session, request methods, request
headers, replies, SDP and SIP fire
This note covers
the following topics: current state of the art in Internet Telephony, key
protocols involved in VoIP and their roles in this new technology, limitations
of current VoIP technology, key factors influencing the growth of Internet
telephony services for global communications.
This document is published by National
Institute of Standards and Technology, this covers the following: Overview of
VOIP, VOIP Equipment, Quality of Service Issues, Overview of VOIP Data
Handling ,Cost, Privacy and Legal Issues with VOIP, VOIP Security
Issues,Speed and Quality, H.323, SIP Gateway Decomposition,
Firewalls, Address Translation, and Call Establishment, Encryption and
IPsec, Solutions to the VOIPsec Issues, Planning for VOIP
Deployment, VOIP Risks, Threats, and Vulnerabilities.
Author(s): D. Richard Kuhn,
Thomas J. Walsh, Steffen Fries
This paper focuses on these VoIP specific security threats and the
countermeasures to mitigate the problem. At
first, this paper gives a brief introduction of VoIP techniques: the network
structure, network components, protocols and standards, data handling
procedures, quality of service requirements, etc. Secondly, the paper
discusses the VoIP specific security threats using the principle of CIA
(Confidentiality, Integrity and Availability). The countermeasure to mitigate
these threats is also discussed.