Agenda Voice Security Architecture VoIP Risk VoIP threats Service disruption Design Consideration Attacks.

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
CANTO – 2006 Information Security and Voice over IP (VoIP) Robert Potvin, CISSP VP - Strategic Consulting June 21st, 2006.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 MITP 458 : Information Security and Assurance VOIP Xeon Group Rohit Bhat Ryan Hannan Alan Mui Irfan Siddiqui.
1 Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture Conference ICS – Wireless Group Meeting Tempe, Arizona.
The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Voice Systems Security It’s not just about toll fraud anymore Chuck Dunbar Voice Systems Network Engineer Wells Fargo.
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
1 ITEC 809 Securing SIP in VoIP Domain Iyad Alsmairat Supervisor: Dr. Rajan Shankaran.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 VOIP Network Threats Let the subscribers beware Gerard Wilkes October 24, 2006.
Threats and Attacks Principles of Information Security, 2nd Edition
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Rajeev Bevara CS-555 Security Threats in VoIP. What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
By: Christopher Henderson.  What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service 
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
October 10-13, 2006 San Diego Convention Center, San Diego California Taking IP Security to the Next Level Real-time threat mitigation.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Computer & Network Security
C8- Securing Information Systems
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Chapter 4 Application Level Security in Cellular Networks.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Security Challenges in the Enterprise. January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 2 Panelists Franchesca Walker,
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim.
Track A: Network Security 9AM-10AM May 6, 2004 Security And Next Generation VoIP George G. McBride Senior Manager, Security Practice Lucent Technologies.
Chapter 12: Secure Communications and Network Attacks.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
A Listener Among the Static: Christian Prescott Gabriel Fair Security and Voice over IP.
Surveillance and Security Systems Cyber Security Integration.
Securing Information Systems
The study and demonstration on SIP security vulnerabilities
CHAPTER 4 Information Security.
Securing Information Systems
Security in Networking
LO1 - Know about aspects of cyber security
Presentation transcript:

Agenda Voice Security Architecture VoIP Risk VoIP threats Service disruption Design Consideration Attacks

Telephony hacker had high degree of skill Cybercrime activity include: - DOS for extortion - Hijacking for reselling Voice traffic need different treatment to data Security control,policies and technology is essential to protecting assets

Good security starts with good architecture Three basic Voip paradigm System evolved from Traditional PBX System evolved from data switch platform System design for VoIP

Voice change risk by adding : Complexity New Access point New device and protocols Risk categories that affected is: Line safety Confidentially & Availability Operational & Financial Reputation

VoIP threats is: Service disruption Service interception Service fraud and abuse

VoIP threats is: Service disruption Service interception Service fraud and abuse

VoIP threats is: Service disruption Service interception Service fraud and abuse

Poor design Attack on PBX include malware DOS Equipment failure or rogue device

Separate data and voice network Use PVlan Use NAT Use Switching device to limit User Agent interference Consider UPN(User Personalized Network ) Consider Scalability End-to end security

Common voice attack Eavesdropping Packet spoofing and masquerading Replay attacks Hijacking and malicious call Voice mail bombing, SPAM,…