2001
DOI: 10.1007/978-0-387-35413-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities and Security Limitations of Current IP Telephony Systems

Abstract: Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part of our future communication infrastructure (e.g. as classical PBX enhancement or replacement) continuous high availability, stable and error-free operation and the protection of the privacy of the spoken word are challenges, that definitely have to be met. Since manufacturers start deploying new end systems and infrastructure components rather… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2003
2003
2020
2020

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Thus, the internet security system expected to assure that data received exactly at the right manner. Irrespective of the original cause of losing data integrity, this loss will definitely be a terrible for internet security system [30]. Last, authenticity is directly related to the techniques of security system which performs to establish data transfer when started and where end, thus trying to assure the data received was really originated where it says it is coming from and sent by the one mentioned on its label [31].…”
Section: Cloud Crm Security Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the internet security system expected to assure that data received exactly at the right manner. Irrespective of the original cause of losing data integrity, this loss will definitely be a terrible for internet security system [30]. Last, authenticity is directly related to the techniques of security system which performs to establish data transfer when started and where end, thus trying to assure the data received was really originated where it says it is coming from and sent by the one mentioned on its label [31].…”
Section: Cloud Crm Security Challengesmentioning
confidence: 99%
“…First, deploy physical security mechanism to minimize the hazard. The second type is the intangible protection security dealing with the system defense to enhance the capability of enterprise security, allowing conducting a successful business over network [30]. It's important to remember that awareness and responsibility of the underlying cloud CRM refer to the creating trust among enterprises rather the internet threats itself.…”
Section: Cloud Crm Security Challengesmentioning
confidence: 99%
“…Ackermann et al [132] describe threats in VoIP, focusing on specific attacks and vulnerabilities as case studies. Hunter [133], Batchvarov [134], Bradbury [135], and Chau [136] provide summaries of specific security concerns in VoIP.…”
Section: A) General Overviews (42 Items)mentioning
confidence: 99%
“…In the following, we introduce major building blocks based on the notion of a knowledge feedback loop [3,203]. In the following, we introduce major building blocks based on the notion of a knowledge feedback loop [3,203].…”
Section: Security Knowledge Processmentioning
confidence: 99%
“…The first example presents results of an examination of IP telephony systems conducted in 2001 [3]. The first example presents results of an examination of IP telephony systems conducted in 2001 [3].…”
Section: Case Studiesmentioning
confidence: 99%