Saturday, November 27, 2010

Security VoIP protocols

  1. VoIP allows users that is communication in real time over long distances via Internet.Voice over Internet Protocol (VoIP) a popular method to good markets via a computer or an Internet phone calls.
Because it uses the Internet as a data transfer system, VoIP is vulnerable on own for intercept, and other forms of piracy. It is therefore necessary to deal with a number of security protocols to maintain the integrity of VoIP calls.

Tunneling
  • Tunneling is a method private one send data public "wrap" data for public data network private.

  • In fact, the data of the public are hidden network cannot be said that it is a private transfer. This allows data transmission, what would otherwise an open safe and unsafe.

    Encryption
  • Encryption is a fundamental aspect of security.

  • This is how the process of converting data into gibberish opaque stream that can only by someone who knows are decoded to decode. Most of the VoIP systems uses Secure Socket Layer (SSL, which is also used in "https://" website connections) provide their encryption.hair regrowth

    Firewall
  • Since VoIP standard Internet connectivity to send and receive data used questions influential standard Internet on VoIP security.

  • As a result, frontline security VoIP is by using a firewall to soft data type, the computer or maintained in the network and prevents connections not allowed to occur. To deploy a firewall installed and current implementation, this has the advantage of using vonR more resources on the computer if VoIP technologyet is.

    No comments:

    Post a Comment