Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

VoIP Security

 
 

Set Limits

Your main VoIP security policy is simple: First, don't plug any VoIP components into the network until you've made sure there won't be any communications between these devices and the Internet. And second, don't allow any communications between PCs that interact with the Internet and with the VoIP system. That's because PCs are especially vulnerable to attack and could be used to break into the VoIP system or to deny service to the voice applications. They also can commandeer VoIP phones to commit toll fraud, eavesdropping or impersonation.





Keep 'Em Separate



Click to Enlarge

If you must deviate from this policy, make sure everyone understands the risks and that the proper countermeasures are in place to mitigate them. This requires a clear understanding of security, as well as the system architecture and the VoIP protocols involved.

  • 1