Tag Archive | "DoS"

Volume II / Issue no. 2

Security in VoIP

VoIP relies on packet switching, similar to the way that e-mails are sent over the Internet. The technology breaks down a voice call into bite-size information packets. Instead of keeping the switch open all the time, the information is sent and received as needed, allowing excess line capacity to be used to carry other data. When the voice data arrives at its destination, it’s reassembled into a voice call. As voice over IP services grow in popularity, the potential for viruses, worms and other security threats aimed at the technology also will grow. The current paper’s purpose is presenting several security solutions and applying them to integrated systems at an economical and social level.

  Security in VoIP (688.5 KiB, 1,954 hits)

Posted in Information Technology, Volume II, Issue no. 2