Voice Communications in Network Security

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Voice Communications in Network Security:

With the merging of voice, data and video, with technologies such as Voice over IP (VoIP), verifying voice communication is related to network security. When voice communications take place within a network infrastructure, issues of confidentiality, integrity, and authentication are critical.

Private Branch Exchange (PBX) or Plain Old Telephone Service (POTS) voice communications have inherent vulnerability to interception, eavesdropping, and tapping.

Physical security is required to retain security over voice communications within the physical areas of the organization. External security of voice communications is primarily a responsibility of the telephone company.

PBX systems can be violated by attackers, known as “phreakers”, to evade toll charges and conceal their identity. Phreakers can potentially gain access to personal voicemail and reroute or delete messages, as well as redirect inbound and outbound calls.

Security measures to block phreaking include logical or technical controls, administrative controls, and physical controls:

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?