The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Strategy for Enterprise VoIP Security
Abstract
Voice over Internet Protocol (VoIP) networks signal an evolution in telecommunications that is accelerating the convergence of the Internet and the public switched telephone network (PSTN). Offering decreased costs and other benefits, VoIP is poised to transform telecommunications and the organizations that use them. However, some consider VoIP a security nightmare, combining the worst vulnerabilities of IP networks and voice networks. DOS attacks, crash attacks, packet spoofing, buffer overflow attacks, spam over Internet telephony (SPIT), and word injection all pose threats to commercial enterprise networks and the mission critical operations that they support.
Related Content
Ravi Kumar Natashen, Ravindran Kandasamy, A. Karthikeyan, V. Sandhya.
© 2025.
38 pages.
|
L. Rajeshkumar, S. Usha, Joel Jebadurai Devapitchai.
© 2025.
20 pages.
|
Rajiv Gurugopinath, Bangaru Venugopal.
© 2025.
30 pages.
|
Ravindran Kandasamy, R. Ramesh, T. N. Seenivasan., T. Dakshinamurthy, Revathi Perumal, Raghu Narayana Reddy, Hendra Hendra.
© 2025.
20 pages.
|
Dankan Gowda V, Fayzieva Makhbubakhon Rakhimjonovna, R. Yogitha, P. Veeramanikandan, Anil Sharma.
© 2025.
30 pages.
|
M. Basuvaraj, Keshvi Rastogi, S. Chitradevi, D. V. VidyaShree, K. M. Anu.
© 2025.
18 pages.
|
Dankan Gowda V, C. R. Vijay, S. V. Ramanan, K. D. V. Prasad, Anil Sharma.
© 2025.
26 pages.
|
|
|