Skip to main content

RSA Conference Europe 2005 - VOIP and security

Voice over IP is widely seen as one of the next killer applications, integrating data and voice networks as well as applications. However, proprietary voice networks and components also offer good degree of separation and segmentation, increasing confidentiality, integrity and availability of telephony services versus data networks. When these two services are integrated (and in many places they are already), new threats arise and additional risks have to be mitigated. There is no doubt that also the PSTN has seen its share of attacks (war dialing, phreaking, fraud). Migration to VOIP on a large scale will see similar and new types of attacks to the combined infrastructure. It is recommended to separate the two networks logically (or even physically) and conduct an in-depth review of the threats to VOIP and implement effective countermeasures to ensure availability of voice services. The cost savings achieved by using VOIP will mostly be used to implement security.

Comments

Popular posts from this blog

Sony is evil

I just so agree with Todd: Bad Company of the Year Award! : The company that I am putting at the top of my list is a 4 letter word so foul, that it has been banned from my home. I have asked my wife who is Japanese to refrain from buying any of their products for the next 5 years. The Bad company of the year is no other than SONY… Sony is just a big no-buy company. My girlfriend knows why Sony is evil and we both will rather buy a more expensive or less appealing product from a competitor. " Sony is evil " has only 726 hits on Google, but this will increase. Edit: More about the damage Sony does: Artists revolt against DRM Portable stereo's creator got his due, eventually

Why did Microsoft cripple Groove?

I'm currently trying to use Microsoft Groove 2007 as a collaboration tool to gather requirements. What I like about tools like Groove is: - You can open and edit an entry without having to start an additional application (like word, excel) - You can copy and paste pictures (screenshots) directly into an entry - You don't have to save and re-attach changed files - You can work offline - Groove works inside and outside of our network out-of-the-box - We have (as a Microsoft Gold Partner) 100 licenses available What I don't understand about the current offering is that a lot of tools available in the last version have been removed: The following tools and toolsets are no longer available for adding to new or existing workspaces : Contact Manager, Discussion, Document Review, Outliner , Task Manager, Text, Tic- Tac -Toe, Web Links, Welcome Page, Advanced Project Toolset , and Mobile Workspace for SharePoint . (Source: Microsoft Office Groove Help) There is also a large set

Two factor authentication outdated?

According to the article below from The Register (quoting Bruce Schneier), two-factor authentication seems already be outdated. I believe, we should take a careful approach here: Two-factor authentication is certainly better than just user-id and password. Especially online banking in the US has been using just user-id/password and now they are paying the prize for this lax security measure. Stepping up to use onetime passwords (such as RSA SecurID or Aladin tokens) is a first step against sniffing out passwords. However, there is no such thing as complete security. But two-factor authentication is a first step. As every Information Security Officer nows, user awareness is key to increase security. By giving user a device, this awareness increases dramatically. Link to original article. New threats need new response Banks are spending millions on two-factor authentication for their customers but the approach no longer provides adequate protection against fraud or identity theft, accord