VoIP Network Security Research Proposal by write123

VoIP Network Security
A dissertation proposal to study Voice over Internet Protocol (VOIP) network security without compromising efficiency.
# 105828 | 930 words | 12 sources | APA | 2008 | US
Published on Jul 20, 2008 in Computer and Technology (General) , Research Designs (General)


$19.95 Buy and instantly download this paper now

Description:

This paper explains that Voice over IP (VOIP) is one of the most important emerging trends in telecommunications because it integrates communication services into the IP network infrastructure, the Internet, especially e-mail and instant messaging, and standard classical services like telephony. The author stresses that VoIP has problems of confidentiality, integrity and availability of the data and information, which streams through the network. The paper presents a chapter outline of a thesis, which will discuss implementation of VoIP network security emphasizing maintaining the efficiency of this system.

Table of Contents:
Abstract
Chapter One - Advent of Information Technology and the Rise of VoIP
Chapter Two - The Session Initiation Protocol (SIP) as One of the Foundations of VoIP
Chapter Three - Standards for Voice Over IP Implementations
Chapter Four - Proofs of Concept on the Security and Efficiency of VoIP Implementation
Chapter Five - Conclusion

From the Paper:

"Any type of implementation, procedures or processes in existent today should and must adhere to certain standards and industry best practices. VoIP is no different and in this chapter, available standards will be examined in order to determine the validity of the parameters used in the various proofs of concept performed by different proponents. Beginning with RFC 3261, the document will be benchmarked against two United States government publications that define not only VoIP implementation but security considerations involved in the planning up to the operations stage."

Sample of Sources Used:

  • Defense Information Systems Agency (2006) Internet Protocol Telephony and Voice Over Internet Protocol - Security Technical Implementation Guide [Internet], April 2006, Ver. 2, Re. 2. Available from: <http://mattche.iiie.disa.mil/stigs/stig/VoIP-STIG-V2R2.pdf> [Accessed 06 October 2007].
  • Gottlieb, H. (2004) Beyond Interoperability: Network Security as a Voice over IP (VoIP) Enabler [Internet], October 2004. Available from: <http://www.infosec.co.uk/ExhibitorLibrary/22/voip_wp.pdf> [Accessed 06 October 2007].
  • Kuhn, D.R., Walsh, T.J. & Fries, S. (2005) Security Considerations for Voice Over IP Systems [Internet], January 2005, NIST Special Publication 800-58. Available from: <http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf> [Accessed 06 October 2007].
  • Long, T. (2002) Eavesdropping an IP Telephony Call [Internet], October 2002, SANS Institute. Available from: <http://www.sans.org/reading_room/whitepapers/telephone/318.php> [Accessed 06 October 2007].
  • Mihai, A.S. (2007) Voice over IP Security: A layered approach [Internet], May 2007, XMCO Partners. Available from: <http://www.xmcopartners.com/whitepapers/voip-security-layered-approach.pdf> [Accessed 06 October 2007].

Cite this Research Proposal:

APA Format

VoIP Network Security (2008, July 20) Retrieved May 10, 2021, from https://www.academon.com/research-proposal/voip-network-security-105828/

MLA Format

"VoIP Network Security" 20 July 2008. Web. 10 May. 2021. <https://www.academon.com/research-proposal/voip-network-security-105828/>

Comments