VoIP threats outlined

October 25, 2005

The Voice over IP Security Alliance released Monday the first comprehensive description of security and threats in the field of Voice over Internet Protocol.

The results, known as the VoIP Security Threat Taxonomy, provide the industry with a view of VoIP threats, the vulnerabilities and a context for balancing tradeoffs.

"The importance of this accomplishment is that it gives a foundation to all future discussions on VoIP security that are both technically and socially informed. Until now, the public has been uncertain about the various threats, how risks related to each other and technical trade-offs. This is fundamental to all future work in the field," said Jonathan Zar, secretary and outreach chair for VOIPSA, head of the taxonomy project and senior director for SonicWALL.

The project, launched in late March, is the first completed project of VOIPSA, an organization formed in February with the purpose of improving the public awareness of issues and best practices for securing VoIP.

Major elements of the work include recognition of the human element in threats as distinct from their technical means, specific sets of issues for consideration by legislative bodies and by law enforcement, and a detailed structure for technical vulnerabilities across the value chain.

"While technical work on the taxonomy will continue, the results published today provide an effective framework with which to inform the press, the policy community and other projects within VOIPSA," said Zar.

Copyright 2005 by United Press International

Explore further: Traditional keyboard sounds can be decoded, compromising privacy

Related Stories

PGP founder unveils new VoIP security

March 23, 2006

Somewhere out there, someone is a little too curious about your data. This is the main concern of Phil Zimmermann, the creator of the industry standard PGP (Pretty Good Privacy) e-mail encryption protocol who has just debuted ...

View from the Top: VoIP comes of age

August 4, 2005

Voice over Internet Protocol has emerged as an increasingly popular alternative to traditional phone connections for its ability to transport voice communications over data networks like the Internet.

New research aims to plug holes in VOIP before they happen

April 4, 2006

The National Science Foundation has issed four awards totaling $600,000 to the University of North Texas to lead a multi-university collaboration to develop a geographically distributed, secure test bed to analyze vulnerabilities ...

Recommended for you

Dark matter may be smoother than expected

December 7, 2016

Analysis of a giant new galaxy survey, made with ESO's VLT Survey Telescope in Chile, suggests that dark matter may be less dense and more smoothly distributed throughout space than previously thought. An international team ...

Giant radio flare of Cygnus X-3 detected by astronomers

December 7, 2016

(Phys.org)—Russian astronomers have recently observed a giant radio flare from a strong X-ray binary source known as Cygnus X-3 (Cyg X-3 for short). The flare occurred after more than five years of quiescence of this source. ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.