Current threats to and technical solutions for voice security

被引:0
|
作者
Collier, MD [1 ]
机构
[1] SecureLogix Corp, San Antonio, TX 78232 USA
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
While attacks against an enterprise's Internet connection receive the most attention, attacks against an enterprise through the voice network remain common. Attackers can bypass Internet-related defenses through access to Unauthorized and poorly secured modems. The Internet itself, and an enterprise's Internet security policies and procedures, has made this issue worse by forcing "addicted" users to access the Internet through their Internet Service Provider (ISP). A typical enterprise, even one with modem usage policies and procedures, will have some number of unauthorized and/or poorly secured modems. Traditional techniques do not address this issue. Scanning and modem protection technologies assist in enforcement, but do not solve the problem. The ideal solution lies in applying concepts from the IP security network to the voice network. By deploying in-line security devices on all voice network trunk circuits, applications such as firewalls, integrated scanning, authentication, Virtual Private Networks (VPNs), and intrusion detection can be applied. This approach provides the same level of protection and a familiar paradigm on the voice network, as is present on the IP network. In addition, because the voice network is billed based on usage, rather than bandwidth, this security device can support applications that provide a significant Return On Investment (ROI).
引用
收藏
页码:2685 / 2695
页数:11
相关论文
共 50 条
  • [41] Cyber-security on smart grid: Threats and potential solutions
    Gunduz, Muhammed Zekeriya
    Das, Resul
    COMPUTER NETWORKS, 2020, 169 (169)
  • [42] A review of threats, protocols, and solutions to enhance the security of wireless networks
    Ataelmanan, Somya Khidir Mohmmed
    Al Hassan, Mostafa Ahmed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (04): : 108 - 115
  • [43] Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions
    Abbasi, Mahmoud
    Plaza-Hernandez, Marta
    Prieto, Javier
    Corchado, Juan M.
    IEEE ACCESS, 2022, 10 : 97197 - 97216
  • [44] An Analysis of Smart Contracts Security Threats Alongside Existing Solutions
    Vivar, Antonio Lopez
    Castedo, Alberto Turegano
    Orozco, Ana Lucila Sandoval
    Villalba, Luis Javier Garcia
    ENTROPY, 2020, 22 (02)
  • [45] Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
    Essa, Areej
    Al-Shoura, Tariq
    Al Nabulsi, Ahmad
    Al-Ali, A. R.
    Aloul, Fadi
    2018 2ND INTERNATIONAL CONFERENCE ON SMART GRID AND SMART CITIES (ICSGSC 2018), 2018, : 62 - 67
  • [46] Energy & National Security: An Exploration of Threats, Solutions, and Alternative Futures
    Triola, Larry C.
    2008 IEEE ENERGY 2030 CONFERENCE, 2008, : 367 - 413
  • [47] A survey on security challenges in cloud computing: issues, threats, and solutions
    Tabrizchi, Hamed
    Kuchaki Rafsanjani, Marjan
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (12): : 9493 - 9532
  • [48] Bitcoin Concepts, Threats, and Machine-Learning Security Solutions
    Rahouti, Mohamed
    Xiong, Kaiqi
    Ghani, Nasir
    IEEE ACCESS, 2018, 6 : 67189 - 67205
  • [49] ASSESSING THE SERVICES, SECURITY THREATS, CHALLENGES AND SOLUTIONS IN THE INTERNET OF THINGS
    Zahra, Syed Rameem
    Chishti, Mohammad Ahsan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (03): : 457 - 484
  • [50] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    ELECTRONICS, 2023, 12 (06)