Integrated services by telecom operators and Unified Communications technology promise a quick payback and great convenience. However, it was discovered from practice that VOIP and IPPBX services can cause many problems, first of all relating to information security and fraud. What information security issues can arise for a company if Unified Communications are used? VOIP/PBX/MGW broken in 60 seconds - is it possible? Effective methods and practicalities of Unified Communications security will be discussed.
2. VoIP is attractive ! VoIP Access company’s network Manage calls ( fraud ) Data defect and replacement Call interception Personal data theft and so on …
3. VoIP infrastructure components VoIP segment is an integration of a number of specialized platforms and network devices, different networks and technologies
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22. Thank you for your attention ! Questions ? Konstantin Gurzov [email_address]
Notes de l'éditeur
DBMS, FTP, OS, Web, Mail, DNS, LDAP, Remote administration, Network hardware Number of vulnerable services associated with password policy Metrics are based on “alive” data collected in security internal audits conducted by Positive Technologies experts, 2009
High, Medium, Low Dynamic site Typical site Detailed analysis of a vulnerable application