Friday, November 16, 2007

Securing VoIP One More Way

From the article "Are VoIP systems prepared for attacks?" on SC magazine, I snipped the last of it, the advise. Although seems to be repeating the process of securing a any data network, VoIP IP Telephony services needed to be secured in addition to the security in place for the VoIP. In addition meaning, VoIP Phones are more like a computers and acts and behaves like computers. So once you have provided the regular data security, following may provide a peace of mind to IP Professionals that are in charge.
The top five ways for Securing VoIP
. End-users must demand that VoIP protocols are both inherently secure and open.
. Companies must pledge support for moving to open, royalty-free and documented security standards, and away from proprietary VoIP protocols.
Corporations should audit their products, and replace insecure or proprietary usage.
A secure VoIP protocol should be released under an open source or general public license agreement.
A secure protocol should contain end-to-end encryption, control and configuration of end-devices and mutual authentication.

The article "Are VoIP systems prepared for attacks?" (although focusing on general security and Skype, it never hurts, if you have little time to read)


Blog Widget by LinkWithin