Beltug

BELTUG checklist VoIP and Security


Date:06/10/2006


The WG Security prepared a paper on "security and VoIP". It is available for our members (just log in)

CONTENTS

1 INTRODUCTION 3
1.1 PURPOSE    VOICE OVER IP – IP TELEPHONY – INTERNET TELEPHONY 3
1.2 IN AND OUT OF SCOPE 3
1.3 WHY NOW? 4
2 VOIP:  ANYONE RESPONSIBLE FOR SECURITY? AWARENESS IS KEY! 4
2.1.1 Saving some euros through VoIP could cost your enterprise a lot more 5
2.1.2 Numerous benefits of the technology, but manpower remains a big issue for IT 5
2.1.3 Data networks focus on reliability of transmission 5
2.1.4 “SpIT it out” Spam over Internet Telephony 6
2.1.5 More specifics on Internet Telephony tools 6
3 GENERIC SECURITY PROCESS:  A USER’S PERSPECTIVE 7
4 BEST PRACTICES FROM THE WG 9
4.1 ASSESS 9
4.1.1 Organisation 9
4.1.2 Procedures 10
4.1.3 Technology 11
4.2 DESIGN 11
4.2.1 Organisation 11
4.2.2 Procedures 13
4.2.3 Technology 15
5 SEPARATED ISSUE : COST 17
6 VOIP RISKS: GENERIC VIEW AND STANDARD METHODOLOGY 18
7 PROJECT APPROACH: REQUIREMENTS, RISK ANALYSIS AND COUNTERMEASURES 19

 

 



 

Dear visitor,

Access to more information about this topic and/or to download the paper is easy and fast, but exclusively for Beltug members (just login to get access).

Beltug gathers a lot of information. Here you find the advantages of Beltug membership

The Beltug Team

Click here to login




>>> Back to overview