212 868 0688

IP telephony is also known as Voice over Internet Protocol, or VoIP. VoIP services works by digitizing audio and transmitting it over an Internet connection. This is opposed to classical land line phones, which create an analog connection between users. This is considerably a new technology that allows telephone calls to be made over the Internet. With new technology, there comes a greater dependence for security.

The evolving risks of such data traveling over an inherently insecure network, combined with firewalls under a constant barrage of malicious traffic, present unique security challenges to protecting data.

Major Risks of Vulnerability:
- Eavesdropping
- Identity Spoofing
- Denial of Service
- Unwanted Traffic
The most publicized form of attack, denial of service (DoS) attacks are also among the most dif?cult to completely eliminate. Even among the hacker community, DoS attacks are regarded as trivial and considered bad form because they require so little effort to execute. Still, because of their ease of implementation and potentially signi?cant damage, DoS attacks deserve special attention

These attacks include the following:

• TCP SYN Flood

• Ping of Death

• UDP fragment ?ood

• ICMP fragment ?ood