Analysis and Prioritization of VoIP Security Challenges

Message:
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:
P network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP applicationIP network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP application
Language:
Persian
Published:
Quarterly Journal of Bi Management Studies, Volume:7 Issue: 25, 2018
Pages:
183 to 218
magiran.com/p1993176  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!