Thursday, May 16, 2019

Service and the Security implication of VOIP Dissertation

Service and the Security implication of VOIP - Dissertation ExampleThe use and importance of telecommunication in business flowerpotnot be overstressed. In some industries, it is even their source if not the most important base of operations that drives the business processes. However, in order to use the technology efficiently and accomplishmentively, its limitations and security has to be assessed and determined. The anonymity of the profit provides an added complexity to the challenge since the prosecution and detection of perpetuators is not only hard but the detection of an tangible eavesdropping is already hard in itself. This dissertation will provide the best infrastructure that is both brisk and redundant that will provide the basic security to basic security threats. As proof of pattern this dissertation will also demonstrate how an actual VoIP system can be set-up and used, this dissertation has also confirmed how an actual attack on the security can be done and its potential effect on the user. This dissertation also provided a technical strategy on how to remediate the security vulnerabilities. However, as any technical security strategy goes, there will forever and a day be a navvy that is mend at overcoming the best and the latest security system. A determined hacker will always find a way to overcome any security system thrown in breast of him thus this dissertation will provide recommendation that will protect businesses from falling prey to opportunist and disreputable shady characters. Acknowledgement This author would like to thank his love ones for providing him with the inspirations to stay on track for him to be able to finish this dissertation. This author would also like to thank his instructor for providing him the chance and opportunity to need not only from his instructors knowledge but also from the wisdom his instructor imparts. The operable way this authors instructor presents solutions to complex problems have inspir ed this author to be better than what he perceive can become. This authors instructor made him realise that this author can be more than what he want to be or could become. Table of Contents Abstract 3 Acknowledgement 4 Table of Contents 5 1.0Introduction 5 1.1 Overview 6 1.2 Existing Problems 7 1.3 Aims and Objectives 8 1.4 Project Objectives 9 1.5 Research Methodology 10 1.6 Structure of the Dissertation 12 2.0 Literature check up on 13 Chapter Summary 26 3. 0 Methodology 28 4.0 Voice over IP death penalty and Threats and Vulnerabilities Demonstration 30 5.0 Statement of Result 49 6.0 Analysis AND Discussion 51 7.0 Conclusion 53 8.0 Recommendation 57 Reference List and Bibliography 61 Appendices 67 List of Figures 67 List of Tables 68 Asterisk installation guide 68 CentOS/Linux installation guide 68 1.0 Introduction Asterisk was demonstrable as a cheap alternative to PBX by Mark Spencer. Since then the face of VoIP has never been the like again. Since 1989 the development of V oIP as an alternative transport system for telephony signalling has progress to a point that nearly all of the telephone infrastructures all over the world are being used as selective information transporter along with voice channel. VoIP simply enabled telecommunication companies to maximize its infrastructure by making several(prenominal) channels available in a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.