Nine Steps to Secure Your VoIP
Properly securing your Voice over IP system is a complex process because VoIP is the integration of data and voice into a single network. These tips will help secure your connection.
VoIP security requires adapting traditional network security measures for a high-speed, dynamic environment.
Like other software systems, VoIP systems have been found to have vulnerabilities due to buffer overflows and improper packet header handling. These flaws typically occur because the software is not validating critical information properly. For example, a short integer may be used as a table index without checking whether the parameter passed to the function exceeds 32,767, resulting in invalid memory accesses or crashing of the system.
Attacks exploiting vulnerabilities in the switch software or protocols may lead to deterioration in service or even denial of service or denial of some functionality of the switch. For example: if unauthorized access can be established to any branch of the communication channel (such as a CCS link or a TCP/IP link), it may be possible to flood the link with bogus messages, causing severe deterioration (possibly denial) of service. A voice over IP system is likely to have even more vulnerabilities when it is connected to the Internet.
Read the full story here.