Explore BrainMass
Share

VoIP Security Vulnerabilities

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

1. List at least five security threats specific to VoIP. Give a brief description and possible scenario.
2. List at least 10 Vulnerabilities in VoIP. Briefly describe each of the listed vulnerability, along with a possible recommendation for a countermeasure.
3. Explain the end-to-end process of how VoIP works.
4. Go back to problem 3 and list possible vulnerabilities in each step of the process.
5. In problem 4 list what would be most risky vulnerability, with the most possible damage
6. In problem 5 - list how you would create a plan to mitigate possible damages and have services running smoothly and securely.

© BrainMass Inc. brainmass.com October 25, 2018, 6:10 am ad1c9bdddf
https://brainmass.com/computer-science/operating-systems/voip-security-vulnerabilities-450431

Solution Preview

A foundation to the solution for the homework assignment

A foundation to the solution for the homework assignment

The top five security threats specific to VOIP are:

DoS (denial of service) Attacks on VoIP Networks (Porter, 2008).
Jim Higdon states the reason DoS attacks are a critical threat across VOIP are that "DoS attacks can overwhelm your company's phone lines, creating long-term busy signals, forced call disconnects and an exhausted work force" (Jim Higdon, 2008).
VoIP Eavesdropping: A hacker that can listen in on conversations using
any means across a VOIP. Imagine you providing your bank account
information while using a VoIP and a hacker is listening.

Microsoft Office Communications Server: Hackers will decrypt encrypted data across the server, reroute ...

Solution Summary

VoIP security vulnerabilities are examined. The security threats are listed as well as the recommendations for a countermeasure.

$2.19
See Also This Related BrainMass Solution

Security Assessment for Countermeasures and Mitigation

I have a paper that is due in four weeks, I have come up with a propasl but i am not sure how to put it togather or where to start. I am asking for help to put my on propsoal to begin this project. Any anyone could give me some pointers would been very helpfull thanks. I proposal to this Project is attached

Week 8 - Final Project Paper

Deliverables
The deliverables for your Project Paper Assignment includes a Word document that answers the questions described below. Your final paper should be between 10 to 15 pages long. Be sure the report is in MS Word, Arial 12-pt font, with double spacing and 1 inch margins all-around, no additional spaces allowed. Cover page and references pages are also requird. The

Company Z provides telephony services to customers. These services include VoIP. You are hired to create a security assessment for company Z for an upcoming audit by the counties authoritative agents to certify company Z compliant to ISO 17799 Standard for The professional Practices for the Business Continuity Planner. In this security assessment you are asked to conduct a complete
a) network security threat assessment (3%)
b) network security vulnerability assessment (3%)
c) risk assessment (3%)
d) countermeasures and mitigation (3%)
e) the last part of your work will include your personal experiences and what you have learned in this class reflected towards securing your system's network (3%)

You may use web resources as references, however make sure to include all your resources and cite from them with author, year of publication, and the corresponding page or paragraph numbers.

View Full Posting Details