Monday, May 13, 2019
VOIP security (information technology) Essay Example | Topics and Well Written Essays - 750 words
VOIP security (information technology) - Essay ExampleIn most of the cases the people dont know that someone is between them and they believe that they are public lecture in a secure private network. (Ransome & John W, 2005) The attacker controls the entire conversation and intercepts all the messages whence injects new ones. This the reason that we should not give any personal information to each other apply VoIP networks because it is vulnerable to man in the middle attack.VoIP networks are also vulnerable to Phreaking attacks. Phreaking is the subculture activity of people we schooling and then experiment with telecommunication systems such as the public telephone systems. Today when telephone systems assimilate become computerized this word is closely related to computer hacking. (Endler & Mark D, 2007) In a VoIP network the hackers alters unalike frequencies to get hold of the call. The attackers can manipulate the entire phone system. The use of Phreaking began when autom atic switches were used in the telephone systems.VoIP networks are also vulnerable to vishing. Its another term for VoIP Phishing. It is basically a vile practice which uses social engineering over a telephone network. It can use the features used by VoIP networks to gain admission fee to personal information of anyone for the purpose of reward. (Porter, 2006) The attacker makes a call and pretends to be a representative of a trust worthy organization such as your bank to gain access to your personal bank details. To avoid this kind of attack you should never give any private or confidential information through a telephone network. This is the reason that trusted companies like PayPal and other banks never ask for your personal information through emails and automated phone calls. (Porter, 2006)VoIP Spam is the repeated dialing of unwanted pre save phone calls with the help of VoIP features. This attack is
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment