White Paper Documents
The following are useful White Papers:
Order by: name | date
| author
VoIP Security - does it exist? Date: 11.30.2006 Author: Sheran Gunasekera
Ensure successful VoWLAN: Understand security in VoIP networks Date: 10.19.2006 Author: Brent Lorenz Source: Network Systems Designline VoWLAN promises to bring a new level of cost effectiveness to VoIP. Relying on VoIP security implemented entirely in software is simply not a viable strategy for VoIP implementations over WAN. Voices. . I hear Voices Date: 08.10.2006 Author: Ivan Arce Source: IEEE
Comprehensive VoIP Security for the Enterprise Date: 05.08.2006 Author: Sipera
A Proactive Approach to VoIP Security Date: 04.28.2006 Author: Bogdan Materna To securely implement VoIP networks a proactive approach and an understanding of the differences between VoIP and traditional data networks is required. Voice over IP Security - a layered approach Date: 03.20.2006 Author: Amarandei-Stavila Mihai
Emerging Voice Services - Voice over Internet Protocol Date: 11.22.2005 Author: Austrailian Government Voice over Internet Protocol (VOIP) services offer consumers a number of benefits, including greater functionality, nomadicity (the ability to use the service in different locations) and, depending on their circumstances, cost savings. Security in SIP-Based Networks Date: 09.20.2005 Source: Cisco Systems This paper explores various network security threat models faced by today's Session Initiation Protocol (SIP)-based voice networks, and describes network security solutions based on Cisco SIP-enabled products. SIP, Security and Session Controllers Date: 06.15.2005 Source: Newport Networks Rolling out a public SIP service brings with it several security issues. Both users and Service Providers must understand these issues, but the burden is with the Service Provider to offer a secure and reliable service to the user. Security Issues with SOHO VoIP Gateways Date: 05.20.2005 Author: Peter Thermos and Guy Hadsall Source: VopSecurity This paper reflects the results of a research study that aimed at identifying security issues associated with residential VoIP gateways, including signaling and media routing, implementation, operation, and network management. Evolution of Session Border Controllers Date: 04.01.2005 Source: Juniper his paper discusses VoIP networking issues in different customer environments and how three-way architecture efficiently addresses the range of VoIP topologies. Security Considerations for Voice Over IP Systems Date: 01.01.2005 Author: D. Richard Kuhn, Thomas J. Walsh, Steffen Fries Source: NIST Voice over IP – the transmission of voice over packet-switched IP networks – is one of the most important emerging trends in telecommunications. As with many new technologies, VOIP introduces both security risks and opportunities. Building Residential VoIP Gateways: VoIP Security Implementation Date: 11.10.2004 Author: Debbie Greenstreet and Sophia Scoggins Source: AnalogZone This article addresses the implementation of security in residential VoIP networks. Voice Over Internet Protocol (VoIP) and Security Date: 10.26.2004 Author: Greg S. Tucker Source: SANS Business concerns of implementing VoIP, components of a VoIP system, and relevant security issues and concerns as they apply to the topics, are explored. Intrusion Prevention: The Future of VoIP Security Date: 10.18.2004 Author: Rohit Dhamankar Source: TippingPoint VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. Enterprise Telecom Security Threats Date: 10.01.2004 Author: Mark D. Collier Source: SecureLogix Legacy voice networks have never been properly secured, and the convergence of voice and data is dramatically increasing network complexity and security risks. Security Considerations when Implementing IP Telephony in Enterprise Networks Date: 05.26.2004 Source: ERICSSON As we will see, already today there are technologies and products available that can be installed and used to secure the usage of IP Telephony as well as other related applications. Secure IP Telephony For The Enterprise Date: 04.18.2004 Source: CheckPoint Security is an important consideration when implementing VoIP because each element in the VoIP infrastructure, accessible on the network like any computer, can be attacked or used as a launching point for deeper attacks. Voice over IP Security Date: 03.12.2004 Author: Matthew Tanase Source: SecurityFocus Careful planning and architecture, borrowed from our data security experiences, can help mitigate the risks and amplify the returns of VoIP. Protection for VoIP Vulnerabilities Date: 02.24.2004 Source: Ranch Networks The mass deployment of this new technology also brings along with it many challenges – one area being the security of your network. VOIP SECURITY TECHNICAL IMPLEMENTATION GUIDE Date: 01.13.2004 Source: Defense Information Systems Agency This VoIP Security Technical Implementation Guide (STIG) is published as a tool to assist in securing of Department of Defense (DOD) networks and systems supporting VoIP technology. Next Generation Networks and Security: An Introduction Date: 01.01.2004 Author: Peter Thermos and Guy Hadsall Source: VopSecurity Any complex system is prone to inherit oversights which may be exploited in order to realize an attack. As such, a NGN infrastructure maintains a high level of complexity, which also inherits a respective number of weaknesses. Security Analysis: Traditional Telephony and IP Telephony Date: 04.01.2003 Author: Alan Klein Source: GIAC The goal of this paper is to take a step back and analyze the security implications of migrating from a traditional telephony architecture to an IP telephony architecture. Often Overlooked: PBX and Voice Security in a Networked World Date: 01.24.2003 Author: Chris Herrera Source: SANS This paper provides a concise summary of voice security issues in an enterprise. Security threats to IP telephony-based networks Date: 12.15.2002 Author: Ofir Arkin This article highlights the security risk factors associated with IP telephony-based networks, and compares them, when appropriate, with the public switched telephony network (PSTN) and other traditional telephony-based solutions. Securing IP Telephony Date: 12.15.2002 Author: Tony Rybczynski Source: Internet Telephony Enterprises are starting to roll out IP telephony solutions. With online security breaches doubling every year, enterprises need to address IP telephony system security. VoIP Security Challenges In Enterprise And Service Provider Networks Date: 11.01.2002 Author: Steve Bakke Source: Internet Telephony The promise of mass VoIP consumption also increases the risk for widespread security violations, spawning a new sense of urgency to plug potential security holes now before hackers wreak havoc on corporate voice networks. How VoIP is changing the network security equation Date: 10.14.2002 Author: Philip Bednarz Source: EE Times VoIP equipment manufacturers are under pressure to design phones that are cost competitive with ordinary handsets while duplicating their quality, functionality and security features. Eavesdropping an IP Telephony Call Date: 10.04.2002 Author: Tom Long Source: SANS This paper suggests that the art of call eavesdropping may be easier that ever before. Therefore, careful consideration is required before implementing an IP Telephony solution. Security Concerns with VOIP Date: 08.18.2001 Source: SANS Until the present time, security issues in the data and voice worlds have been seen to be completely separate in the minds of most users. This paper will deal briefly with four security issues that are well known in the data world. |