Search
Recommended Sites
Related Links






Valid XHTML 1.0 Transitional

Valid CSS!
   

Informative Articles

The Lowdown on VoIP
It seems like technology is headed for a massive telephone change over. The traditional Public Switched Telephone Network (PSTN) is looking to be replaced by VoIP. VoIP is short for Voice over IP. VoIP is the routing of conversations over an IP...

VoIP: A Favourable Solution To Business Communication
Communication is an important part of business systems. Whether it is internal communication between the different functions of an organisation or external communication with the suppliers, partners and customers, the communication channel needs to...

VoIP And Your Broadband Selection
Why is the regional bell operating companies dropping the rates on their DSL residential service? Easy, to gain more customers. Ok, makes sense. But let's look a little closer. First off, VoIP is making a major push into our homes. I for...

VOIP Internet Phone and Internet Telephony FAQ
How VoIP / Internet Phone Works VoIP converts the voice signal from your telephone into a digital signal that travels over the Internet. If you are calling a regular phone number, the signal is then converted back at the other end. Internet Voice...

....VoIP Phone Advantages & Drawbacks....
VoIP phone service providers offer many advantages to the residential and small office/home office user. If you have a high speed internet connection then choosing a VoIP phone service might be right for you. But before you run out & buy the 1st...

 
Is Your VOIP Service Secure?

For individuals, VOIP security is primarily a matter of preventing others from eavesdropping on their conversations. Some VOIP service providers offer voice security through encryption or separate data routes.
Regular precautions for transferring files should, of course, always be followed. A firewall should be in place for protecting your computer from the internet and any data or program that is downloaded should be checked for viruses.
But users should reealize that VOIP hardware devices are inherently more vulnerable to attack. Some types of equipment can be made unstable or inoperable when they receive certain types of data. Some internet phones are also susceptible to data piracy, revealing private information under certain conditions.
While this probably won't be of much concern when you're calling Uncle Tim, it is a huge concern for businesses that consistently use telephone communication for discussing sensitive business information. As VOIP popularity increases, security is becoming a growing concern and is now receiving widespread attention. Security Issues
It's mainly businesses that need to be concerned with security issues related to VOIP. They are more susceptible to the Denial of Service (DOS) attacks and other forms of obnoxious hacking because many businesses operate personal gateways and other equipment for connecting to the internet.
There are several security issues associated with VOIP. Eavesdropping is an understandable fear with both regular and VOIP calls, but there are additional concerns unique to this technology. Since VOIP data is traveling across the internet just like any other kind of data, it is vulnerable to the same types of attacks. Hackers have countless software tools available to them to retrieve information being transmitted over the internet. These tools are as effective with voice data as with any other kind of data.
Another security threat is the possibility of sending viruses with VOIP data. This hasn't surfaced yet, but viruses could potentially overload VOIP networks, reduced sound quality and create delays.
VOIP isn't secure against spam either. This refers to receiving unsolicited marketing calls from companies selling their goods and services.
There are several points in the transmission of VOIP calls that hackers can use to recover information. In additin to retrieving actual conversations, they can also access critical information such as user identities and VOIP phone numbers. With this information, a hacker can place phone calls using someone else's identity.
Attackers could also record phone calls while eavesdropping on conversations and even potentially restructure voice data to create discussions that never actually existed! Log files could also be accessed and altered.
There are ways currently available that address such security issues. The first is with encryption that provides the same sort of security used in sending credit card information over a secure data connection. The second is to separate VOIP data from other internet traffic by using a Virtual Local Area Network (VLAN). Both methods can degrade call quality, but they present an alternative for sensitive calls.

About the Author
Visit VOIP Solutions to learn more. Ron King is a full-time researcher, writer, and web developer. Copyright 2005 Ron King. This article may be reprinted if the resource box is left intact.

Sign up for PayPal and start accepting credit card payments instantly.