Preview

As The Organization

Satisfactory Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
As The Organization
As the organization’s IT security professional, you have been asked by your organization’s CIO and CEO to suggest steps and techniques that would mitigate risks associated with VoIP and SIP applications at the same time, maintaining the controls provided via C-I-A model.
Provide a well-developed (remember who the intended recipients are) response outlining your recommendations. Be sure to substantiate each of your recommendations for mitigating identifiable risks.
Please be sure to provide your response via the proper thread under the discussion question link for this chapter. Please do not submit your reply via email, use only the thread provided by Canvas to submit your responses.

The book mentions some of the risks for VoIP and SIP applications being:
Eavesdropping
Call control
Denial of service (Dos) or distributed denial of service (DDoS)
Poor network performance
Server failure
Disclosure of confidential information
Recommendations to mitigate risks associated with VoIP:
Construction of a reliable and properly configured network:
Ensuring the right equipment is being used, and there is redundancy built into the network infrastructure will help increase the availability, and uptime of services.
Ensuring the network is configured to separate different data (i.e. Voice data, Computer data) through VLANs and using Quality of Service (QoS) routing for voice services will help the integrity of the data being transmitted for VoIP, and also leave the data more secure.
Controlled management of network devices, and user accounts:
Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.
Proper management of user accounts will ensure the information and access to devices on the network confidential.
Set up a solid user policy:
Having a clear and well thought out user policy will keep the work environment and ultimately

You May Also Find These Documents Helpful

  • Powerful Essays

    Primary hardware that must have a backup to ensure availability is the web server and the database server. In addition to having a primary and a backup of each of these two servers a replication server must also be implemented into the architecture in order for the databases on each server to mirror each other. With proper planning and implementation of this system if the primary servers have a failure there will not be any interruption of service to the customer who is accessing the…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Product lines include VPN, Firewall, Wireless LAN, Biometrics, and Access Control. Using the two sites that contain evaluated products (www.commoncriteriaportal.org or http://www.niap-ccevs.org/cc-scheme/) identify the products that will provide Sony with the optimal solution and use the Security Targets to describe the security functionality it provides, and state how this product reduces the potential risks identified in the media.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The past couple of decades have seen a tremendous growth in technology. Phones, phone calls, and how we make them, are no exception - a lot has changed since the days of the PBX operator. Today a lot of phone calls being made are being made over the internet –vs- over traditional phone lines. Just like everything else on the internet, there are protocols in place when it comes to making and receiving phone calls.…

    • 698 Words
    • 2 Pages
    Good Essays
  • Good Essays

    About.com defined QOS as a board collection of networking technologies and techniques. About.com also states the goal of QOS is to provide guarantees on the ability of a network to deliver predictable results. Both email and VoIP are bandwidth hogs if you don't use QOS on your network it will literally bring your network to a crawl if you aren't using codec’s to compress and QOS. A good way to eliminate this problem is to add VLAN’s. VLANs help prioritize the network traffic by separating…

    • 441 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In large companies it becomes a task to authenticate every single system since it involves many workgroup switches. Having a centralized authenticating server reduces the cost by simplifying heavy authenticating…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    thesis

    • 2423 Words
    • 9 Pages

    Have all employees sign an acceptable use policy outlining what is and isn’t allowed on the network and the repercussions of violating this agreement…

    • 2423 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Leading Organization

    • 4738 Words
    • 19 Pages

    In an environment changing so rapidly it is difficult to lead and manage, while maintaining profitable growth and competitively advantageous position. International competition is increasing, lowering long term growth and sustainability. It is important to analyze the forces that shape the future of the business world as well as the future of society at large. The traditional management processes need to be revamped and modified to create a new outlook. In the following four portfolios it has been tried to analyze the various aspects of leadership and management. The first portfolio focuses upon the problems that a leader faces at interpersonal levels, and ways to assess and address the problems. The second portfolio focuses upon the different leadership theories which are analyzed in brief, and it has been discussed how a leadership style can be adopted by scrutinizing the theory and matching them with real life situation. The third portfolio encompasses the broader aspects in which an organization operates. It depicts about the organization culture which is the regulatory force in an organization to generate success. The last part, fourth portfolio is based on the facts that managing organization and leading it is a constant process, and to do so we need to be connected to the society and environment. The world…

    • 4738 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Advances in Information Technology have made access to sensitive information with great concern. Privacy has to be paramount as the internet broadens its horizon strategically. Various acts had to be implemented to protect the privacy of individuals. The act that I am going to talk about is the Telephone Consumer Act of 1991, (TPCA).…

    • 484 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Future of Voip Technology

    • 609 Words
    • 3 Pages

    VoIP is a relatively new technology and so the benefits are just beginning to be realized. VoIP technology has the ability to completely change the telephone industry as we know it. Big changes are in store for the way we use telephones and this section will address some of the changes to expect. Obstacles still stand in the way of progression and there are problems that need to be addressed before this technology can take over.…

    • 609 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Telephone systems play a very important role in the modern workplace. Telephone systems give individuals the ability to communicate and share information. During the early years of telephones, there was a limited amount of functions that could be used. In the modern workplace, there are many more functions that telephone systems are capable of. Multi-user calls, or conference calls, are now fairly standard. VOIP telephone service provides the cost saving solutions which are very helpful for making international calls at a much lower rate as compared to the other modes of communication. Used in various communications needs and requirements, VOIP telephones are very common. Many Voip handsets are available in the market. Telephone exchanges then operated under the licensed name of the Bell Telephone Company. Telephone systems are more complex and have more advanced features than the phones typically used for personal communication. Although they resemble the telephones that can be found in everyone’s home, office telephone systems deliver considerably more performance for business operations. The operational requirements and the budgetary needs are specific to each company and corporation.…

    • 497 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    QoS also provide high-quality support for IP voice and video services, improve the service provided in low-speed access devices (e.g. Internet mobile wireless devices), and provide differentiated Internet access service to client with different service-quality levels at different prices [5]. QoS can be differentiated, that is, QoS provided in the network can vary with load conditions [6].…

    • 1225 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Voip

    • 4718 Words
    • 19 Pages

    Voice Over Internet Protocol (VoIP) and Security Submitted By Sanjay Yadav Amity School Of Engineering And Technology Amity University Rajasthan Table of Contents Abstract......................................................................................................................... 3 Background .................................................................................................................. 3 Quality of Service .........................................................................................................4 Latency ...........................................................................................................................4…

    • 4718 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    The phone companies have to build in internal layer of data security so that the calls data collected is used only by the authorities and the data is not misused by any third parties.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays