Current threats to and technical solutions for voice security

被引:0
|
作者
Collier, MD [1 ]
机构
[1] SecureLogix Corp, San Antonio, TX 78232 USA
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
While attacks against an enterprise's Internet connection receive the most attention, attacks against an enterprise through the voice network remain common. Attackers can bypass Internet-related defenses through access to Unauthorized and poorly secured modems. The Internet itself, and an enterprise's Internet security policies and procedures, has made this issue worse by forcing "addicted" users to access the Internet through their Internet Service Provider (ISP). A typical enterprise, even one with modem usage policies and procedures, will have some number of unauthorized and/or poorly secured modems. Traditional techniques do not address this issue. Scanning and modem protection technologies assist in enforcement, but do not solve the problem. The ideal solution lies in applying concepts from the IP security network to the voice network. By deploying in-line security devices on all voice network trunk circuits, applications such as firewalls, integrated scanning, authentication, Virtual Private Networks (VPNs), and intrusion detection can be applied. This approach provides the same level of protection and a familiar paradigm on the voice network, as is present on the IP network. In addition, because the voice network is billed based on usage, rather than bandwidth, this security device can support applications that provide a significant Return On Investment (ROI).
引用
收藏
页码:2685 / 2695
页数:11
相关论文
共 50 条
  • [31] A survey on cloud computing security: Issues, threats, and solutions
    Singh, Saurabh
    Jeong, Young-Sik
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 200 - 222
  • [32] Cloud Computing Security and Challenges: Issues, Threats, and Solutions
    Alrasheed, Sadeem Hamad
    Alhariri, Majid Aied
    Adubaykhi, Sulaiman Abdulaziz
    El Khediri, Salim
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 166 - 172
  • [33] RFID systems: A survey on security threats and proposed solutions
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 159 - 170
  • [34] A review Report on WiMAX Vulnerabilities, Security Threats and their Solutions
    Kumar, Chandan
    Arya, Y. D. S.
    Agarwal, Gaurav
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1963 - 1967
  • [35] Social network security: Issues, challenges, threats, and solutions
    Rathore, Shailendra
    Sharma, Pradip Kumar
    Loia, Vincenzo
    Jeong, Young-Sik
    Park, Jong Hyuk
    INFORMATION SCIENCES, 2017, 421 : 43 - 69
  • [36] A Review of Security Threats, Solutions and Trust Management in VANETs
    Premasudha, B. G.
    Ram, V. Ravi
    Miller, J.
    Suma, R.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 38 - 57
  • [37] An Overview of Security Threats, Solutions and Challenges in WBANs for Healthcare
    Mucchi, Lorenzo
    Jayousi, Sara
    Martinelli, Alessio
    Caputo, Stefano
    Marcocci, Patrizio
    2019 13TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2019, : 151 - 156
  • [38] Security of IoT Application Layer: Requirements, Threats, and Solutions
    Abbasi, Mahmoud
    Plaza-Hernandez, Marta
    Mezquita, Yeray
    AMBIENT INTELLIGENCE-SOFTWARE AND APPLICATIONS-13TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE, 2023, 603 : 86 - 100
  • [39] IoT cybersecurity threats mitigation via integrated technical and non-technical solutions
    Al-Sibai, Hazim S.
    Alrubaie, Theyab
    Elmedany, Wael M.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (03) : 298 - 333
  • [40] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    The Journal of Supercomputing, 2020, 76 : 9493 - 9532