VOIP Advantages, Disadvantages And Security Term Paper

H.323 SIP and other VOIP protocols can be disconnected at the voice gateway that interfaces with the PSTN to allow for stronger authentication and access control on the gateway system (Kuhn, Walsh & Fries, 2005). However this can make key management problematic. Other ways to secure the data and voice network include implementing "packet filters" to track malicious connections (although this doesn't always work and is not always sensible) or IPsec and Secure Shell to manage remote voice and data access so hijackers can't utilize the remote system (Kuhn, Walsh & Fries, 2005). If performance declines because of security measures then the organization can take advantage of encryption at a gateway like the router rather than "individual endpoints" which would allow "IPsec tunneling" however this burden should be placed at a central point in the system so that all VOIP traffic is safe and encrypted rather than traffic only at specific gateways, like at the router (Flatland 26). A central location is universally protective whereas endpoint protection is time consuming and less efficient. Either way each requires a bit of work and training to set up correctly (Flatland, 2005).

Organizations have to determine whether they are capable of managing the risk involved with using VOIP before they invest and take advantage of the benefits VOIP has to offer. It is important that "continuity of operations" is not interrupted while deploying VOIP systems (Kuhn, Walsh, and Fries, p. 11). Competent trainers will use voice samples and insert them into data packets to test their transmission on the Internet, using Real-time Transport Protocol or RTP packets, which are able to hold larger volumes of data that can assemble information from one point to another.

There are also many versions of VOIP that an organization must look at before they decide what is right for them. For example, a company might select a key management scheme capable of addressing SIP calls, RTSP sessions, multicast and more; an example of a key system capable...

...

MIKEY allows for what researchers call "crypto session bundles" which Kuhn, Walsh & Fries (2005) describe as "a collection of crypto sessions that may have a common traffic encryption key or TEK, generation key or TGK and "session security parameters" (p. 34). Many different versions of SRTP exist, which all provide greater confidentiality and message authentication as well as "replay protection to the RTP/RTCP traffic" allowing companies the flexibility to adapt application requirements with their own profiles (Kuhn, Walsh & Fries 33).
Conclusions

There are multiple benefits of VOIP which include greater flexibility, lower long-term costs and integration of services. Just as there are benefits there are also disadvantages including the cost to start a system and security costs associated with creating VOIP specific security changes. Flatland (2005) sums it up best noting key to successful integration of VOIP is "selecting a VOIP gateway, wireless access points and phones" that are compatible with a company's existing system (p. 26). Large and small companies alike will find if given enough time, training and patience, that VOIP is superior to other telephone data transmission services and utilities.

Sources Used in Documents:

References

Flatland, Jeanne. Integrating Voice into the School Network: Benefits of Wireless VOIP,

E Journal (Technological Horizons in Education) vol. 32.8: 2005. p. 26

Kuhn, Richard, Walsh, Thomas and Fries, Steffen. Security Considerations for Voice

Over IP Systems. Special Publication 800-58, National Institute of Standards and Technology, U.S. Department of Commerce, January 2005
http://www.voipreview.org/news.details.aspx?nid=27
Windley, Nicholas. "Benefits of VOIP" EzineArticles July 26, 2005. Retrieved 16, December 2005 http://ezinearticles.com/?id=54083


Cite this Document:

"VOIP Advantages Disadvantages And Security" (2007, December 16) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/voip-advantages-disadvantages-and-security-33228

"VOIP Advantages Disadvantages And Security" 16 December 2007. Web.26 April. 2024. <
https://www.paperdue.com/essay/voip-advantages-disadvantages-and-security-33228>

"VOIP Advantages Disadvantages And Security", 16 December 2007, Accessed.26 April. 2024,
https://www.paperdue.com/essay/voip-advantages-disadvantages-and-security-33228

Related Documents

Security measures are available to minimize this effect, in fact an entire industry has emerged to address these needs, but control will never be the same as when the employees are under one roof and subject to scrutinizing eyes and ears and computers and cell phones are free from potential hackers. To put virtual office security into perspective think about all the security measures that are taken in traditional offices

VOIP With the advent of information technology, the ways different aspects of life work and operate have changed a great deal. The advancement in telecommunication sector have revolutionized and redefined the communication systems at all aspects around the world. The process of bringing the world closer that started with the invention of Morse codes has now entered an era of its own where distances of miles are bridged to a few

Communication Upgrade Plan Communications Upgrade Plan The Abco Company wishes to upgrade its telecommunications technology to a system that is more efficient than the outdated Centrex system now in place. As part of the upgrade plan, the CEO has asked for an explanation of the various systems and technologies available for the upgrade. This research explores various technologies and recommends the proper solution for the business problem at hand. Communications Upgrade Plan The Centrex

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Value Digital Privacy Information Technology The Value Digital Privacy in an Information Technology Age National security concerns in society and the continual investing in Internet, telephone, text and e-mail monitoring systems by enterprises are reshaping the individual citizen's rights to privacy. For U.S. citizens and employees, this is particularly challenging to accept and is often outright rejected as this nations' culture has been predicated on individual liberties and an assurance of privacy. The

With the widespread use of such technologies, we require greater understanding of the personal and social attributes that affect why people use computer-mediated communication (CMC) and the outcomes of CMC-related behavior." (Papacharissi & Rubin, 2000) Barriers and Issues The most fundamental concern in the refurbishment building's networking and VoIP proposal is also the industry's most basic barriers to accomplishing the goal of networking success. In other words, instituting a highly efficient