Current threats to and technical solutions for voice security

被引:0
|
作者
Collier, MD [1 ]
机构
[1] SecureLogix Corp, San Antonio, TX 78232 USA
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
While attacks against an enterprise's Internet connection receive the most attention, attacks against an enterprise through the voice network remain common. Attackers can bypass Internet-related defenses through access to Unauthorized and poorly secured modems. The Internet itself, and an enterprise's Internet security policies and procedures, has made this issue worse by forcing "addicted" users to access the Internet through their Internet Service Provider (ISP). A typical enterprise, even one with modem usage policies and procedures, will have some number of unauthorized and/or poorly secured modems. Traditional techniques do not address this issue. Scanning and modem protection technologies assist in enforcement, but do not solve the problem. The ideal solution lies in applying concepts from the IP security network to the voice network. By deploying in-line security devices on all voice network trunk circuits, applications such as firewalls, integrated scanning, authentication, Virtual Private Networks (VPNs), and intrusion detection can be applied. This approach provides the same level of protection and a familiar paradigm on the voice network, as is present on the IP network. In addition, because the voice network is billed based on usage, rather than bandwidth, this security device can support applications that provide a significant Return On Investment (ROI).
引用
收藏
页码:2685 / 2695
页数:11
相关论文
共 50 条
  • [21] Current security threats in the national and international context
    Mihaela, Cristea Lavinia
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ACCOUNTING AND MANAGEMENT INFORMATION SYSTEMS (AMIS IAAER 2019), 2019, : 532 - 547
  • [22] The current Italian government and threats to national security
    Barca, L
    PONTE, 2001, 57 (09) : 30 - 33
  • [23] Challenges for current spectroscopy: Detection of security threats
    Barnes, Norman P.
    Advances in Spectroscopy for Lasers and Sensing, 2006, 231 : 63 - 72
  • [24] JTAG Security Threats: Current Attacks and Countermeasures
    Wang S.
    Kameyama S.
    Takahashi H.
    Wang, Senling (wang@cs.ehime-u.ac.jp), 1600, Japan Institute of Electronics Packaging (24): : 668 - 674
  • [25] THE MULTIDIMENSIONAL THREATS OF UNMANNED AERIAL SYSTEMS: EXPLORING BIOMECHANICAL, TECHNICAL, OPERATIONAL, AND LEGAL SOLUTIONS FOR ENSURING SAFETY AND SECURITY
    Perz R.
    Archives of Transport, 2024, 69 (01) : 91 - 111
  • [26] Security Threats to Voice Services in 5G Standalone Networks
    Cui, Zhiwei
    Cui, Baojiang
    Fu, Junsong
    Dong, Renhai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [28] 5G Security: Analysis of Threats and Solutions
    Ahmad, Ijaz
    Kumar, Tanesh
    Liyanage, Madhusanka
    Okwuibe, Jude
    Ylianttila, Mika
    Gurtov, Andrei
    2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2017, : 193 - 199
  • [29] Intrusion Threats And Security Solutions For Autonomous Vehicle Networks
    Boumiza, Safa
    Braham, Rafik
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 120 - 127
  • [30] Cloud computing security: Attacks, threats, risk and solutions
    Kaushik S.
    Gandhi C.
    Kaushik, Shweta (shwetakaushik10@gmail.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19) : 50 - 71