Current threats to and technical solutions for voice security

被引:0
|
作者
Collier, MD [1 ]
机构
[1] SecureLogix Corp, San Antonio, TX 78232 USA
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
While attacks against an enterprise's Internet connection receive the most attention, attacks against an enterprise through the voice network remain common. Attackers can bypass Internet-related defenses through access to Unauthorized and poorly secured modems. The Internet itself, and an enterprise's Internet security policies and procedures, has made this issue worse by forcing "addicted" users to access the Internet through their Internet Service Provider (ISP). A typical enterprise, even one with modem usage policies and procedures, will have some number of unauthorized and/or poorly secured modems. Traditional techniques do not address this issue. Scanning and modem protection technologies assist in enforcement, but do not solve the problem. The ideal solution lies in applying concepts from the IP security network to the voice network. By deploying in-line security devices on all voice network trunk circuits, applications such as firewalls, integrated scanning, authentication, Virtual Private Networks (VPNs), and intrusion detection can be applied. This approach provides the same level of protection and a familiar paradigm on the voice network, as is present on the IP network. In addition, because the voice network is billed based on usage, rather than bandwidth, this security device can support applications that provide a significant Return On Investment (ROI).
引用
收藏
页码:2685 / 2695
页数:11
相关论文
共 50 条
  • [1] Cloud security: Emerging threats and current solutions
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 126 - 140
  • [2] Technical Solutions for Mitigating Security Threats Caused by Health Professionals in Clinical Settings
    Luis Fernandez-Aleman, Jose
    Sanchez Garcia, Ana Belen
    Garcia-Mateos, Gines
    Toval, Ambrosio
    2015 37TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2015, : 1389 - 1392
  • [3] WLAN security threats & solutions
    Majstor, F
    LCN 2003: 28TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2003, : 650 - 650
  • [4] Cloud Security Threats and Solutions: A Survey
    Butt, Umer Ahmed
    Amin, Rashid
    Mehmood, Muhammad
    Aldabbas, Hamza
    Alharbi, Mafawez T.
    Albaqami, Nasser
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (01) : 387 - 413
  • [5] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [6] A Survey on Threats and Security Solutions for IoT
    Gavra, Vlad-Dacian
    Dobra, Ionut-Marian
    Pop, Ovidiu Aurel
    2020 43RD INTERNATIONAL SPRING SEMINAR ON ELECTRONICS TECHNOLOGY (ISSE), 2020,
  • [7] A Survey of IoT Security Threats and Solutions
    Radovici, Alexandru
    Rusu, Cristian
    Serban, Razvan
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [8] Cloud Security Threats and Solutions: A Survey
    Umer Ahmed Butt
    Rashid Amin
    Muhammad Mehmood
    Hamza Aldabbas
    Mafawez T. Alharbi
    Nasser Albaqami
    Wireless Personal Communications, 2023, 128 : 387 - 413
  • [9] Virtualization: Issues, Security Threats, and Solutions
    Pearce, Michael
    Zeadally, Sherali
    Hunt, Ray
    ACM COMPUTING SURVEYS, 2013, 45 (02)
  • [10] A Review on Cloud Security Threats and Solutions
    Sebastian, Anu Maria
    Kizhakkethottam, Jubilent J.
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,