Skip to main content

What is VoIP ?

Voice over Internet Protocol (VoIP) is a
form of communication that allows you
to make phone calls over a broadband
internet connection instead of typical
analog telephone lines. Basic VoIP
access usually allows you to call
others who are also receiving calls
over the internet. Interconnected VoIP
services also allow you to make and
receive calls to and from traditional
landline numbers, usually for a service
fee. Some VoIP services require a
computer or a dedicated VoIP phone,
while others allow you to use your
landline phone to place VoIP calls
through a special adapter. VoIP is
becoming an attractive
communications option for consumers.
Given the trend towards lower fees for
basic broadband service and the brisk
adoption of even faster internet
offerings, VoIP usage should only gain
popularity with time. However, as VoIP
usage increases, so will the potential
threats to the typical user. While VoIP
vulnerabilities are typically similar to
the ones users face on the internet,
new threats, scams, and attacks
unique to IP telephony are now
emerging.
Threats / Risks
Many of the threats associated with
VoIP are similar to the threats inherent
to any internet application. Internet
users are already familiar with the
nuisance of email abuse in the form of
spam and phishing attempts. VoIP
opens yet another pathway for these
annoyances, which can lead to spam
over internet telephony (SPIT),
spoofing, and identity theft.
Additionally, the confidentiality of
VoIP conversations themselves has
come into question, depending on
service type or VoIP configuration.
Spam over internet telephony (SPIT)
As VoIP usage increases, so will the
pesky marketing strategies associated
with it. Perennial
annoyances like telemarketing and
spam have been plaguing consumers
and internet users for years. A new
sort of hybrid of these two concepts is
SPIT, or spam over internet telephony.
Like
email spamming, sending commercial
messages via VoIP is fast and cheap.
Unlike traditional telemarketing,
though, VoIP offers the potential for
large volumes of unsolicited calls, due
to the wide array of tools already
available to attackers on the internet.
Telemarketers could easily send large
amounts of messages to VoIP
customers. Unlike traditional spam
email messages, which
average only 10–20 kilobytes in file
size, unwanted VoIP voicemails can
require megabytes of storage.
Spoofing
It is technically possible for an
attacker to masquerade as another
VoIP caller. For example, an attacker
could possibly inject a bogus caller ID
into an ordinary VoIP call so that the
receiver believes the call to be coming
from a known and trusted source (a
bank, for example). The receiver,
fooled by the electronic identification
of the caller, may place unwarranted
trust in the person at the other end. In
such an exchange, the receiver may be
tricked into disclosing personal
information like account numbers,
social security numbers, or secondary
authentication factor: a mother’s
maiden name, for example. This
scheme is essentially the VoIP version
of traditional phishing, where a user
follows links in an unsolicited email
and is tricked into providing personal
information on a bogus web site.
Attackers may use these bits and
pieces of personal information to
complete partial identity records of
victims of identity theft. Confidentiality
concerns Many critics of VoIP
question its confidentiality. The
concern is that VoIP data sometimes
travels unencrypted over the internet.
Therefore, it is technically possible for
someone to collect VoIP data and
attempt to reconstruct a conversation.
Although it is extremely difficult to
achieve, some software programs are
designed to piece together bits and
pieces of VoIP data in an effort to
reconstruct conversations. While such
activity is currently rare, you should
be aware of this possibility as it may
increase as VoIP becomes more
widespread.
How to Protect Against Risks
Many of the principles and practices
for safe VoIP usage are the same as
those you may already be practicing
with other internet applications.
Ignoring these general principles could
allow
attackers to gain control of your
computer operating system by means
of an existing software flaw or a
misconfiguration unrelated to your
VoIP application. It may then be
possible for them
to exploit flaws in your VoIP
configuration, thereby possibly gaining
access to personal information you
share when using VoIP. Here are some
of the key practices of good personal
computing:
• Use and maintain anti-virus and
anti-spyware programs.
• Be cautious about opening files
attached to email messages or instant
messages.
• Verify the authenticity and security of
downloaded files and new software.
• Configure your web browser(s)
securely.
• Use a firewall.
• Identify, back-up, and secure your
personal or financial data.
• Create and use strong passwords.
• Patch and update your application
software.
• Do not divulge personal information
to people you don’t know.
• If you are using a software VoIP
application, consider using encryption
software for both
your installation and for those you
wish to talk to.

Comments

Popular posts from this blog

Physical Teleportation Theoretical method to do It!

Teleportation is the ability of moving matter from one point in time and space to another point in time and space instantaneously. There are different types of teleportation available at this time both visual and physical teleportation are possible and we use visual teleportation as our starting point. Types Visual body teleportation Astral body teleportation The different types of visual teleportation are. visual body or astral body teleportation , or visual object teleportation but before we can master teleportation we must first learn the art of Telekinesis/Psychokinesis and Clairsentience and the higher state of consciousness the seventh sense. Other abilities useful in teleportation are Tele-Visualization and ESP (Extrasensory Perception). The ability of teleportation is used in Time travel, Interstellar travel, and Dimensional travel. Teleportation is the near instantaneous transport of the Psychic from one location to another and there is no other fo...

Guitar : Scale And Its Link To The Chords With A minor Pentatonic scale

Guitar : Scale And Its Link To The Chords With A minor Pentatonic scale we will learn the following things: 01. What is a scale?  Some basic theory on scales and the notes in them... You will have to wait for Part II (novice) for the whole story though! 02. How scales relate to chords:  why one scale can be used to solo over a certain chord progression, and another scale can't! 03. The A Minor Pentatonic scale:  an easy example of a scale that you are going to use for soloing! OK! Let's get going for your first lesson in improvisation and soloing!

Convert ARF to MP4, WMV, MP3 with ARF Converter

Convert ARF to MP4, WMV, MP3 with ARF Converter Need to convert ARF to MP4, convert ARF to WMV, MP3? ARF Converter can help easily convert ARF files. Get your ARF File Converter to open and play ARF files now. ARF, standing for “advanced recording file”, is a file extension for a WebEx advanced recording file from a network-based recording. An ARF file contains the video data, a table of contents, an attendee list, and other information on separate panels. The ARF file extension is for recordings downloaded by the user. The ARF file extension is also used for automatic response files. The *.arf files are WebEx recordings directly downloaded by the user. However, we often meet problems when open or play ARF files. Why? Because the incompatibility of ARF file is not so good. To solve the compatibility and open or play ARF files with zone problems, it is nice to convert ARF to MP4, convert ARF to WMV, MP3 or other common video and audio formats. What Kind of ARF Converter or ARF Player Ca...