VoIP-Security and Issues <ul><li>Presented by </li></ul><ul><li>Ketan Reddy Peddabachi </li></ul><ul><li>  </li></ul><ul><...
Organization <ul><li>What is Voip? </li></ul><ul><li>The VoIP Technology </li></ul><ul><li>Security Issues </li></ul><ul><...
What is VoIP? <ul><li>VoIP is a technology that allows us to make voice calls using a broadband connection instead of the ...
The VoIP Technology <ul><li>3 ways of making calls: </li></ul><ul><ul><ul><li>Using ATA  (analog telephone adaptor)  </li>...
<ul><li>VoIP </li></ul>
Security Issues <ul><li>DoS-Denial of Service </li></ul><ul><li>Eavesdropping  </li></ul><ul><li>Gateway technologies of V...
<ul><li>VoIP </li></ul>
Precautions <ul><li>Encryption </li></ul><ul><li>Firewall configuration </li></ul><ul><li>Use of Proxy Servers </li></ul><...
REFERENCES <ul><li>www.Howstuffworks.com </li></ul><ul><li>www.computerworld.com </li></ul><ul><li>www.hhi.corecom.com/voi...
<ul><li>Discussion </li></ul>
Upcoming SlideShare
Loading in …5
×

K. Peddabachi

330 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
330
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

K. Peddabachi

  1. 1. VoIP-Security and Issues <ul><li>Presented by </li></ul><ul><li>Ketan Reddy Peddabachi </li></ul><ul><li> </li></ul><ul><li>Date:04/10/2007 </li></ul>
  2. 2. Organization <ul><li>What is Voip? </li></ul><ul><li>The VoIP Technology </li></ul><ul><li>Security Issues </li></ul><ul><li>Precautions </li></ul><ul><li>Discussion </li></ul>
  3. 3. What is VoIP? <ul><li>VoIP is a technology that allows us to make voice calls using a broadband connection instead of the regular phone line. </li></ul>
  4. 4. The VoIP Technology <ul><li>3 ways of making calls: </li></ul><ul><ul><ul><li>Using ATA (analog telephone adaptor) </li></ul></ul></ul><ul><ul><ul><li>Using special IP phones </li></ul></ul></ul><ul><ul><ul><li>Computer-to-Computer </li></ul></ul></ul>
  5. 5. <ul><li>VoIP </li></ul>
  6. 6. Security Issues <ul><li>DoS-Denial of Service </li></ul><ul><li>Eavesdropping </li></ul><ul><li>Gateway technologies of VoIP </li></ul><ul><li>Spoofing (also called man-in-the-middle attacks ) </li></ul><ul><li>Spamming </li></ul>
  7. 7. <ul><li>VoIP </li></ul>
  8. 8. Precautions <ul><li>Encryption </li></ul><ul><li>Firewall configuration </li></ul><ul><li>Use of Proxy Servers </li></ul><ul><li>Using PBX’s </li></ul><ul><li>Enforcing authentication </li></ul>
  9. 9. REFERENCES <ul><li>www.Howstuffworks.com </li></ul><ul><li>www.computerworld.com </li></ul><ul><li>www.hhi.corecom.com/voipsecurity.htm </li></ul>
  10. 10. <ul><li>Discussion </li></ul>

×