Friday, November 16, 2007

Securing VoIP One More Way

From the article "Are VoIP systems prepared for attacks?" on SC magazine, I snipped the last of it, the advise. Although seems to be repeating the process of securing a any data network, VoIP IP Telephony services needed to be secured in addition to the security in place for the VoIP. In addition meaning, VoIP Phones are more like a computers and acts and behaves like computers. So once you have provided the regular data security, following may provide a peace of mind to IP Professionals that are in charge.
The top five ways for Securing VoIP
1
. End-users must demand that VoIP protocols are both inherently secure and open.
2
. Companies must pledge support for moving to open, royalty-free and documented security standards, and away from proprietary VoIP protocols.
3.
Corporations should audit their products, and replace insecure or proprietary usage.
4.
A secure VoIP protocol should be released under an open source or general public license agreement.
5.
A secure protocol should contain end-to-end encryption, control and configuration of end-devices and mutual authentication.

The article "Are VoIP systems prepared for attacks?" (although focusing on general security and Skype, it never hurts, if you have little time to read)

0 comments:

Blog Widget by LinkWithin